首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   131篇
  免费   34篇
  国内免费   7篇
  2024年   2篇
  2023年   3篇
  2022年   2篇
  2021年   2篇
  2020年   5篇
  2019年   2篇
  2018年   6篇
  2017年   16篇
  2016年   14篇
  2015年   1篇
  2014年   7篇
  2013年   11篇
  2012年   13篇
  2011年   9篇
  2010年   8篇
  2009年   14篇
  2008年   8篇
  2007年   8篇
  2006年   9篇
  2005年   9篇
  2004年   3篇
  2003年   3篇
  2002年   2篇
  2001年   6篇
  2000年   4篇
  1999年   1篇
  1996年   1篇
  1994年   1篇
  1993年   1篇
  1990年   1篇
排序方式: 共有172条查询结果,搜索用时 0 毫秒
121.
基于对策论的威胁评估模型   总被引:4,自引:2,他引:2  
数据融合模型一般包括多个层次,威胁评估是其中之一。威胁评估根据态势情况,推测威胁程度及可能的行动方案。在分析对策论和威胁评估的基础上,提出基于矩阵对策的威胁评估模型及分析方法。  相似文献   
122.
This article investigates the communication of professional ethos, the ethical standards of a profession in training, from passing on ideas of patients’ welfare in medical schools to communicating values in military academies. The article examines this through a consideration of the consequences of Wittgenstein’s discussions on the nature of language: how words and sentences acquire meaning. Wittgenstein’s rule-following paradox, the paradox that any act can be brought into correspondence with a rule and thereby that any “meaning” might be applicable to what is being taught, must make us re-evaluate assumptions about a professional ethos as a guide for professionals in their future practice. If, as Wittgenstein asserts, the meaning of a word is its use, we must abandon ideas of an essence of professional ethos encapsulated in words. Ethical standards of the professions are not reducible to a set of rules. Instead teachers must seek to expand the learner’s repertoire of responses and invite different answers rather than a pre-established correct answer.  相似文献   
123.
We analyze an interdiction scenario where an interceptor attempts to catch an intruder as the intruder moves through the area of interest. A motivating example is the detection and interdiction of drug smuggling vessels in the Eastern Pacific and Caribbean. We study two models in this article. The first considers a nonstrategic target that moves through the area without taking evasive action to avoid the interdictor. We determine the optimal location the interceptor should position itself to best respond when a target arrives. The second model analyzes the strategic interaction between the interceptor and intruder using a Blotto approach. The intruder chooses a route to travel on and the interceptor chooses a route to patrol. We model the interaction as a two‐player game with a bilinear payoff function. We compute the optimal strategy for both players and examine several extensions. © 2017 Wiley Periodicals, Inc. Naval Research Logistics, 64: 29–40, 2017  相似文献   
124.
In this study, we consider n firms, each of which produces and sells a different product. The n firms face a common demand stream which requests all their products as a complete set. In addition to the common demand stream, each firm also faces a dedicated demand stream which requires only its own product. The common and dedicated demands are uncertain and follow a general, joint, continuous distribution. Before the demands are realized, each firm needs to determine its capacity or production quantity to maximize its own expected profit. We formulate the problem as a noncooperative game. The sales price per unit for the common demand could be higher or lower than the unit price for the dedicated demand, which affects the firm's inventory rationing policy. Hence, the outcome of the game varies. All of the prices are first assumed to be exogenous. We characterize Nash equilibrium(s) of the game. At the end of the article, we also provide some results for the endogenous pricing. © 2012 Wiley Periodicals, Inc. Naval Research Logistics, 59: 146–159, 2012  相似文献   
125.
基于临近空间防空导弹,在拦截高空高速大机动目标的条件下,对导弹的制导律进行了研究。给出了微分对策制导律的理论知识及其具体算法,通过Simulink工具进行模块化建模,并将制导律模型引入导弹六自由度模型中进行仿真,对比分析导弹飞行轨迹和需用过载,表明微分对策制导律要比常用的比例导引制导律更优。  相似文献   
126.
网络游戏中虚拟财产的保护   总被引:1,自引:0,他引:1  
随着网络游戏产业的快速发展,关于网络虚拟财产的纠纷不断出现。虚拟财产同时具有价值、使用价值和交换价值,完全符合作为物和商品的属性,是一种特殊的财产形式,应得到合法的保护。虚拟财产的保护需要立法、运营商、玩家、教育者等社会各界齐抓共管、共同努力。  相似文献   
127.
目的:探讨不同游戏方式下的暴力网络游戏对不同攻击性特质大学生攻击性的影响。方法:采用攻击性特质问卷、词汇决策任务和竞争反应时任务对60名大学生进行问卷和实验研究。结果:在不同游戏方式下,被试表现出的攻击性认知和行为存在显著差异(F(2,52)=4.41,P<0.05;F(1,52)=50.06,P<0.001)。高、低攻击性特质者在游戏后的攻击性认知和行为上存在显著差异(F(1,52)=15.25,P<0.001;F(1,52)=82.35,P<0.001)。结论:不同游戏方式下的暴力网络游戏对大学生的攻击性存在不同的影响,相比竞争游戏和单人游戏,合作游戏是一种较好的游戏方式,可以在一定程度减少大学生,特别是高攻击性特质大学生的攻击性认知和行为。此外,暴力网络游戏对大学生攻击性认知和攻击性行为的影响存在一致性。  相似文献   
128.
单一来源装备采办下定价策略的博弈分析   总被引:1,自引:1,他引:0  
单一来源装备采办下,由于供应商在装备的定价与装备的升级改造上都存在 相对的比较优势,军方引入渐进式采办来改变自身的不利地位 应用博弈论的观点来对单 一来源装备采办下军方与供应商定价问题进行比较,实现了对单一来源装备采办与竞争策 略下各自收益分析,并用不定次重复博弈对渐进式采办进行了定量分析,对在实际采办过程 中如何实现激励合同和防止腐败问题也进行了理论上的论述。  相似文献   
129.
The routine inspection of facilities storing large numbers of identical items is modeled as a two‐person, sequential game. Timely detection of illegal activity is parameterized in terms of a critical time to detection, and equilibria are derived which provide inspection strategies. Necessary conditions for deterrence of illegal behavior are discussed. © 2001 John Wiley & Sons, Inc. Naval Research Logistics 48: 496–505, 2001  相似文献   
130.
A classic problem in Search Theory is one in which a searcher allocates resources to the points of the integer interval [1, n] in an attempt to find an object which has been hidden in them using a known probability function. In this paper we consider a modification of this problem in which there is a protector who can also allocate resources to the points; allocating these resources makes it more difficult for the searcher to find an object. We model the situation as a two‐person non‐zero‐sum game so that we can take into account the fact that using resources can be costly. It is shown that this game has a unique Nash equilibrium when the searcher's probability of finding an object located at point i is of the form (1 − exp (−λixi)) exp (−μiyi) when the searcher and protector allocate resources xi and yi respectively to point i. An algorithm to find this Nash equilibrium is given. © 2000 John Wiley & Sons, Inc. Naval Research Logistics 47:85–96, 2000  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号