首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   128篇
  免费   49篇
  国内免费   14篇
  2024年   1篇
  2022年   1篇
  2021年   1篇
  2019年   5篇
  2018年   3篇
  2017年   8篇
  2016年   11篇
  2015年   4篇
  2014年   13篇
  2013年   14篇
  2012年   5篇
  2011年   11篇
  2010年   4篇
  2009年   11篇
  2008年   12篇
  2007年   11篇
  2006年   7篇
  2005年   8篇
  2004年   4篇
  2003年   3篇
  2002年   12篇
  2001年   16篇
  2000年   6篇
  1999年   7篇
  1998年   4篇
  1997年   4篇
  1994年   1篇
  1993年   2篇
  1990年   2篇
排序方式: 共有191条查询结果,搜索用时 15 毫秒
111.
在地面运控子网和载荷信息网中设计IPsec、GRE或RFC2003三种IP隧道协议,通过平台信息网和天地测控网,封装的用户数据包能在天地通信链路中路由,以支持在轨载荷和地面运控终端之间端到端的灵活通信。设计支持IP隧道协议通信的天地一体化信息网络架构,给出各级路由器的设置和网段IP地址分配,计算和分析出三种IP隧道协议的通信效率与实时性。分析结果表明,采用IP隧道协议对改变传统地面运控模式、提高运控效率具有重要意义。  相似文献   
112.
Multi‐issue allocation situations study problems where an estate must be divided among a group of agents. The claim of each agent is a vector specifying the amount claimed by each agent on each issue. We present a two‐stage rule. First, we divide the estate among the issues following the constrained equal awards rule. Second, the amount assigned to each issue is divided among the agents in proportion to their demands on this issue. We apply the rule to two real‐world problems: the distribution of natural resources between countries and the distribution of budget for education and research between universities.  相似文献   
113.
Recent counterinsurgency experiences in Iraq and Afghanistan have demonstrated that the local operating environment often is dominated by indigenous power-holders. As counterinsurgents seek to establish control over the local population, collaboration with these agents has become an essential aspect of contemporary counterinsurgency. Although the practice of constructing collaborative relationships with indigenous power-holders might be perceived as unconventional by today's counterinsurgents, the approach itself goes back to the colonial era in which modern counterinsurgency has its roots. This article explores the dynamics, benefits, and dangers of collaborative relationships with indigenous power-holders by analysing an infamous episode in Dutch colonial history, the case of the collaboration between Dutch colonial authorities and warlord Teuku Uma during the Aceh War (1873–1913). This relationship ended in disaster for the Dutch as Uma departed their side at the moment he had become their pivotal asset in the local political landscape. The article explains that the Dutch succeeded to co-opt Uma, but failed to control him as they lacked the will and means to do so. Furthermore this case study provides an insight in the way the Dutch colonial authorities dealt with the complex process of intelligence-gathering in a fragmented indigenous society.  相似文献   
114.
基于我国自主射频识别空中接口协议GJB 7377.1-2011,提出了一种对时钟偏差不敏感的无源RFID标签编解码算法。该算法充分考虑了时钟频率偏差、计数误差、分频误差等对编解码的影响,推导出了标签正确编解码所需的时钟约束条件,并得到了标签编解码的基本思路和方法。仿真结果表明,提出的编解码算法对标签时钟精度要求较低,只要时钟频率大于1.60 MHz,即可满足要求,大大降低了硬件实现的难度和复杂度,与同类实现方式相比,功耗降低了近50%。  相似文献   
115.
A UK House of Commons Defence Committee (HCDC) Report on the Gulf War recommended that the UK should be self‐sufficient in supporting its Armed Forces in times of crisis and not even rely on its Allies. This recommendation is at odds with UK Government policy which rejects any formal strategy of support for the defence industrial base preferring international open competition as its procurement philosophy. This paper examines the various factors ranging from the supply of raw materials, production capacity, stockpiling, international joint ventures, and competition through to the effects on the technological update of weapon systems resulting from this philosophy. It draws conclusions supporting the HCDC recommendation and calls for joint MOD‐Industry action to address the issues involved and thereby reduce the risks to the Defence of the Realm.  相似文献   
116.
分析了目前云计算服务中存在的应用风险和安全隐患,并将其抽象为两方面的问题,即安全边界问题和用户服务资源映射问题。为了解决这两个方面的问题,根据云计算系统的实际需求,给出云计算服务的一种普适性的定义;在此定义基础上,提出了云计算服务的安全框架,并设计了云计算服务各层协议集合。在这个框架和协议集合下,分析了保证云计算服务正常执行所需的四方面要素,以及将诸要素较好地整合在一起的方法。  相似文献   
117.
为解决星际网络场景下的数据传输问题,提出了一种星际容延迟网络路由协议:利用节点的历史连接信息来预测该节点与其各个邻居节点的连接恢复时间;当两个位于同一个域的节点互相连接时,交换彼此的连接时间预测表,并据此决定是否需要使用对方作为中继节点;深空节点的存储资源常常受限,在进行路由选择时将节点的存储区消耗情况也纳入决策。使用NS2进行地-火通信场景仿真,使用一种改进的泛洪路由和一种仅选择网关节点作为下一跳选择的路由策略作对比。仿真结果表明相比其他两种协议,提高了14%的投递成功率并减少了50%的平均传输延迟,并更有效的利用了节点存储资源。  相似文献   
118.
针对现有星载AIS(Automatic Identification System)系统检测概率低的问题,对星载AIS系统的接收信号冲突和检测概率进行了研究和论证,并对影响检测概率的诸多因素进行了分析。首先分析了星载AIS系统与地面AIS系统的差异性,指出了星载AIS面临的新挑战。其次,重点对星载AIS信号多网冲突问题进行了研究,建立了一种基于船舶分布密度函数的星载AIS检测概率模型。最后,通过分析时隙冲突、船舶动态、轨道高度、天线类型和B类AIS船舶等因素对系统检测概率的影响,为工程设计和性能评估提供了一定参考依据。  相似文献   
119.
This article studies operations sequencing for a multi‐stage production inventory system with lead times under predictable (deterministic) yield losses and random demand. We consider various cases with either full or partial release of work‐in‐process inventories, for either pre‐operation or post‐operation cost structures, and under either the total discounted or average cost criteria. We derive necessary and sufficient criteria for the optimal sequence of operations in all cases. While the criteria differ in their specific forms, they all lead to the same principal: those operations with (1) lower yields, (2) lower processing costs, (3) longer lead times, and (4) lower inventory holding costs should be placed higher upstream in the system.Copyright © 2014 Wiley Periodicals, Inc. Naval Research Logistics 61: 144–154, 2014  相似文献   
120.
描述了卫星通信协议中网络层协议SCPS-NP的基本结构,阐述了BM算法与ID3算法原理,提出了一种新的针对空间传输协议的有效分析方法———NP-BM-ID3算法,并通过仿真实验进行验证。实验结果表明:通过将原有的数据集分类,该算法不仅有效地解决了模式串长度不足问题,而且减少了规则总数,在条件属性数量不变的情况下降低了运算复杂度。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号