首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   525篇
  免费   143篇
  国内免费   14篇
  2023年   1篇
  2022年   4篇
  2021年   8篇
  2020年   3篇
  2019年   18篇
  2018年   8篇
  2017年   31篇
  2016年   35篇
  2015年   22篇
  2014年   35篇
  2013年   82篇
  2012年   22篇
  2011年   33篇
  2010年   31篇
  2009年   36篇
  2008年   35篇
  2007年   40篇
  2006年   30篇
  2005年   26篇
  2004年   30篇
  2003年   19篇
  2002年   29篇
  2001年   28篇
  2000年   24篇
  1999年   12篇
  1998年   6篇
  1997年   7篇
  1996年   7篇
  1995年   3篇
  1993年   2篇
  1992年   3篇
  1991年   3篇
  1990年   4篇
  1989年   2篇
  1988年   2篇
  1987年   1篇
排序方式: 共有682条查询结果,搜索用时 15 毫秒
31.
线性系统的鲁棒容错控制设计方法   总被引:1,自引:0,他引:1  
考虑了线性故障系统的鲁棒容错控制问题。利用状态反馈特征结构配置参数化结果,提出了一种鲁棒容错控制设计方法。该方法将故障系统的鲁棒容错控制问题转化为含有约束的最小化问题。数值算例及其仿真结果验证了所设计方法的简单性和有效性。  相似文献   
32.
分析了现阶段我国农村环境污染的主要特点,并对农村环境污染防治的宏观对策进行了系统性分析。由手农村污染严重、防治形势严峻且比城市环境污染情况复杂,在制定农村环境污染防治对策时,需要运用系统工程原理全方位、全过程分析实际情况,制定整体效果最优的系统化对策组合,并注意对策措施的系统性、协调性、连续性和针对性。  相似文献   
33.
面向Agent的建模方法为基于Agent系统的概念化描述提供了一种新的技术.针对多Agent系统分析与建模问题,扩展并规范了面向Agent概念化建模过程,定义了Agent模型及其扩展模型,并给出了形式化描述.同时,给出面向Agent的分析和设计过程,为其具体建模提供了一种高层指导.最后,与其它现有面向Agent的方法在应用方面进行了类比分析,为该方法的广泛和深入地应用研究打下基础.  相似文献   
34.
We study the assignment of flexible servers to stations in tandem lines with service times that are not necessarily exponentially distributed. Our goal is to achieve optimal or near‐optimal throughput. For systems with infinite buffers, it is already known that the effective assignment of flexible servers is robust to the service time distributions. We provide analytical results for small systems and numerical results for larger systems that support the same conclusion for tandem lines with finite buffers. In the process, we propose server assignment heuristics that perform well for systems with different service time distributions. Our research suggests that policies known to be optimal or near‐optimal for Markovian systems are also likely to be effective when used to assign servers to tasks in non‐Markovian systems. © 2010 Wiley Periodicals, Inc. Naval Research Logistics, 2010  相似文献   
35.
The nucleolus solution for cooperative games in characteristic function form is usually computed numerically by solving a sequence of linear programing (LP) problems, or by solving a single, but very large‐scale, LP problem. This article proposes an algebraic method to compute the nucleolus solution analytically (i.e., in closed‐form) for a three‐player cooperative game in characteristic function form. We first consider cooperative games with empty core and derive a formula to compute the nucleolus solution. Next, we examine cooperative games with nonempty core and calculate the nucleolus solution analytically for five possible cases arising from the relationship among the value functions of different coalitions. © 2010 Wiley Periodicals, Inc. Naval Research Logistics, 2010  相似文献   
36.
We consider supply chain coordination in which a manufacturer supplies some product to multiple heterogeneous retailers and wishes to coordinate the supply chain via wholesale price and holding cost subsidy. The retail price is either exogenous or endogenous. The market demand is described by the market share attraction model based on all retailers'shelf‐spaces and retail prices. We obtain optimal solutions for the centralized supply chain, where the optimal retail pricing is a modified version of the well‐known cost plus pricing strategy. We further get feasible contracts for the manufacturer to coordinate the hybrid and decentralized supply chains. The manufacturer can allocate the total profit free to himself and the retail market via the wholesale price when the retail price is exogenous, but otherwise he cannot. Finally, we point out that different characteristics of the retail market are due to different powers of the manufacturer, and the more power the manufacturer has, the simpler the contract to coordinate the chain will be. © 2010 Wiley Periodicals, Inc. Naval Research Logistics, 2010  相似文献   
37.
基于模糊-组合神经网络的信息系统安全风险评估   总被引:1,自引:0,他引:1  
针对信息系统的安全风险评估问题,提出了一种将模糊理论与神经网络进行"浅层次"结合的评估方法。通过对信息系统所涉及的风险因素分别从资产影响、威胁频度、脆弱性严重程度三方面进行分析,建立了信息系统的安全风险层次化结构,并构造了各因素所对应评判集的隶属度矩阵;综合运用模糊推理算法与神经网络仿真技术,对信息系统的安全风险进行评估,进而判定信息系统安全风险等级。最后,通过实例分析说明了算法的应用,并借助误差分析检测了模型的有效性。  相似文献   
38.
通过对国内自动消防设施设备存在问题的归纳,结合城市消防远程监控系统实际功能的实现,从监控终端、通信网络、信息中心三个方面提高系统的容错能力,阐述了实际建设和调试过程中的解决办法,并对系统的可靠性和安全性进行了讨论。  相似文献   
39.
This article studies a min‐max path cover problem, which is to determine a set of paths for k capacitated vehicles to service all the customers in a given weighted graph so that the largest path cost is minimized. The problem has wide applications in vehicle routing, especially when the minimization of the latest service completion time is a critical performance measure. We have analyzed four typical variants of this problem, where the vehicles have either unlimited or limited capacities, and they start from either a given depot or any depot of a given depot set. We have developed approximation algorithms for these four variants, which achieve approximation ratios of max{3 ‐ 2/k,2}, 5, max{5 ‐ 2/k,4}, and 7, respectively. We have also analyzed the approximation hardness of these variants by showing that, unless P = NP , it is impossible for them to achieve approximation ratios less than 4/3, 3/2, 3/2, and 2, respectively. We have further extended the techniques and results developed for this problem to other min‐max vehicle routing problems.© 2010 Wiley Periodicals, Inc. Naval Research Logistics, 2010  相似文献   
40.
针对地空导弹武器系统防空中的火力分配问题,建立了战术级防空C4ISRK系统的Petri网模型。对其进行扩展,即联合谓词Petri网和赋色Petri网,建立旅级火力分配的改进模型,给出了具体的前置谓词公式。为有效分析战术决策的正确性提供了依据和思路。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号