全文获取类型
收费全文 | 1183篇 |
免费 | 448篇 |
国内免费 | 142篇 |
专业分类
1773篇 |
出版年
2024年 | 6篇 |
2023年 | 24篇 |
2022年 | 25篇 |
2021年 | 32篇 |
2020年 | 45篇 |
2019年 | 20篇 |
2018年 | 17篇 |
2017年 | 77篇 |
2016年 | 101篇 |
2015年 | 66篇 |
2014年 | 95篇 |
2013年 | 79篇 |
2012年 | 129篇 |
2011年 | 97篇 |
2010年 | 75篇 |
2009年 | 122篇 |
2008年 | 86篇 |
2007年 | 87篇 |
2006年 | 99篇 |
2005年 | 79篇 |
2004年 | 71篇 |
2003年 | 50篇 |
2002年 | 52篇 |
2001年 | 30篇 |
2000年 | 35篇 |
1999年 | 30篇 |
1998年 | 30篇 |
1997年 | 28篇 |
1996年 | 21篇 |
1995年 | 20篇 |
1994年 | 11篇 |
1993年 | 10篇 |
1992年 | 7篇 |
1991年 | 4篇 |
1990年 | 10篇 |
1989年 | 3篇 |
排序方式: 共有1773条查询结果,搜索用时 0 毫秒
111.
112.
张占军 《装甲兵工程学院学报》1997,(1)
提出了一个在仿真支撑系统中所采用的实时调度仿真模型算法的算法,并且成功地应用在“RDFI—50MW热电厂训练仿真机”中. 相似文献
113.
Studies on ballistic penetration to laminates is complicated, but important for design effective protection of structures. Experimental means of study is expensive and can often be dangerous. Numerical simu-lation has been an excellent supplement, but the computation is time-consuming. Main aim of this thesis was to develop and test an effective tool for real-time prediction of projectile penetrations to laminates by training a neural network and a decision tree regression model. A large number of finite element models were developed;the residual velocities of projectiles fromfinite element simulations were used as the target data and processed to produce sufficient number of training samples. Study focused on steel 4340tpolyurea laminates with various configurations. Four different 3D shapes of the projectiles were modeled and used in the training. The trained neural network and decision tree model was tested using independently generated test samples using finite element models. The predicted projectile velocity values using the trained machine learning models are then compared with thefinite element simulation to verify the effectiveness of the models. Additionally, both models were trained using a published experimental data of projectile impacts to predict residual velocity of projectiles for the unseen samples. Performance of both the models was evaluated and compared. Models trained with Finite element simulation data samples were found capable to give more accurate predication, compared to the models trained with experimental data, becausefinite element modeling can generate much larger training set, and thus finite element solvers can serve as an excellent teacher. This study also showed that neural network model performs better with small experimental dataset compared to decision tree regression model. 相似文献
114.
Daniel Salisbury 《Defense & Security Analysis》2019,35(1):2-22
Illicit procurement networks often target industry in developed economies to acquire materials and components of use in WMD and military programs. These procurement networks are ultimately directed by elements of the proliferating state and utilize state resources to undertake their activities: diplomats and missions, state intelligence networks, and state-connected logistical assets. These state assets have also been utilized to facilitate the export of WMD and military technologies in breach of sanctions. While used in most historic proliferation cases, their role has seen limited consideration in the scholarly literature. This article seeks to systematically contextualize state resources in proliferation networks, arguing that their use lies between state criminality and routine activity in support of national security. Considering the competitive advantages of these assets compared to similar resources available in the private sector, the article argues that nonproliferation efforts have caused states to change how they use these resources through an ongoing process of competitive adaptation. 相似文献
115.
Sunkyo Kim 《海军后勤学研究》2005,52(5):399-408
In this paper, we present the heavy‐traffic bottleneck phenomenon under multiclass deterministic routing and discuss how it can be addressed by decomposition approximation. Examples show that Bitran and Tirupati's method and Whitt's enhancements for deterministic routing may not properly account for this phenomenon. We propose refinements to these methods based on Whitt's variability functions. Results of numerical experiments on simple networks and semiconductor manufacturing process show significant improvement in the approximation of expected waiting time at bottleneck stations. © 2005 Wiley Periodicals, Inc. Naval Research Logistics, 2005. 相似文献
116.
基于蚁群算法的防空C3I系统火力分配模型研究 总被引:1,自引:0,他引:1
针对当前火力分配问题实现难度大的特点,分析各种火力分配优化方法的优缺点,运用新型蚁群算法尝试解决WTA问题。建立了基于蚁群算法的火力分配优化模型,描述了解火力分配问题的一般步骤,通过实例给出了算法,解决了WTA问题。并与匈牙利法相比较,结果表明该方法的合理性和有效性,特别是在武器—目标数较大时,其效率要高于常用的匈牙利法。 相似文献
117.
首先用矩量法精确分析了考虑互耦影响时天线阵元的电流分布,给出了计算电流的解析式,并仿真计算了单元直线阵的电流分布。然后以等效网络法为基础研究互耦影响存在时修正MUSIC算法的DOA估计性能,仿真实验表明在互耦影响存在时MUSIC算法失效,而修正MUSIC算法仍然具有良好的DOA估计性能。 相似文献
118.
多目标规划是一类重要的优化模型,有着广泛的实际应用,但其求解至今仍是运筹学的一个难点.针对一般约束多目标优化问题,在设计了新的适应度函数和选择算子的基础上,提出一种新型多目标遗传算法.将其应用于导弹对集群目标射击效能优化问题,验证了算法的有效性. 相似文献
119.
120.