首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1183篇
  免费   448篇
  国内免费   142篇
  1773篇
  2024年   6篇
  2023年   24篇
  2022年   25篇
  2021年   32篇
  2020年   45篇
  2019年   20篇
  2018年   17篇
  2017年   77篇
  2016年   101篇
  2015年   66篇
  2014年   95篇
  2013年   79篇
  2012年   129篇
  2011年   97篇
  2010年   75篇
  2009年   122篇
  2008年   86篇
  2007年   87篇
  2006年   99篇
  2005年   79篇
  2004年   71篇
  2003年   50篇
  2002年   52篇
  2001年   30篇
  2000年   35篇
  1999年   30篇
  1998年   30篇
  1997年   28篇
  1996年   21篇
  1995年   20篇
  1994年   11篇
  1993年   10篇
  1992年   7篇
  1991年   4篇
  1990年   10篇
  1989年   3篇
排序方式: 共有1773条查询结果,搜索用时 0 毫秒
111.
模糊神经时延 Petri 网的信息融合模型   总被引:2,自引:0,他引:2  
将模糊逻辑与融合技术相结合得到了一种模糊信息融合方法,然后用时延Petri网对此信息融合系统建模,并给出了信息融合系统反应时间的一个计算公式。然后将人工神经网络应用到时延Petri网中,提出了一种多传感器信息融合的模糊神经时延Petri网模型。  相似文献   
112.
提出了一个在仿真支撑系统中所采用的实时调度仿真模型算法的算法,并且成功地应用在“RDFI—50MW热电厂训练仿真机”中.  相似文献   
113.
Studies on ballistic penetration to laminates is complicated, but important for design effective protection of structures. Experimental means of study is expensive and can often be dangerous. Numerical simu-lation has been an excellent supplement, but the computation is time-consuming. Main aim of this thesis was to develop and test an effective tool for real-time prediction of projectile penetrations to laminates by training a neural network and a decision tree regression model. A large number of finite element models were developed;the residual velocities of projectiles fromfinite element simulations were used as the target data and processed to produce sufficient number of training samples. Study focused on steel 4340tpolyurea laminates with various configurations. Four different 3D shapes of the projectiles were modeled and used in the training. The trained neural network and decision tree model was tested using independently generated test samples using finite element models. The predicted projectile velocity values using the trained machine learning models are then compared with thefinite element simulation to verify the effectiveness of the models. Additionally, both models were trained using a published experimental data of projectile impacts to predict residual velocity of projectiles for the unseen samples. Performance of both the models was evaluated and compared. Models trained with Finite element simulation data samples were found capable to give more accurate predication, compared to the models trained with experimental data, becausefinite element modeling can generate much larger training set, and thus finite element solvers can serve as an excellent teacher. This study also showed that neural network model performs better with small experimental dataset compared to decision tree regression model.  相似文献   
114.
Illicit procurement networks often target industry in developed economies to acquire materials and components of use in WMD and military programs. These procurement networks are ultimately directed by elements of the proliferating state and utilize state resources to undertake their activities: diplomats and missions, state intelligence networks, and state-connected logistical assets. These state assets have also been utilized to facilitate the export of WMD and military technologies in breach of sanctions. While used in most historic proliferation cases, their role has seen limited consideration in the scholarly literature. This article seeks to systematically contextualize state resources in proliferation networks, arguing that their use lies between state criminality and routine activity in support of national security. Considering the competitive advantages of these assets compared to similar resources available in the private sector, the article argues that nonproliferation efforts have caused states to change how they use these resources through an ongoing process of competitive adaptation.  相似文献   
115.
In this paper, we present the heavy‐traffic bottleneck phenomenon under multiclass deterministic routing and discuss how it can be addressed by decomposition approximation. Examples show that Bitran and Tirupati's method and Whitt's enhancements for deterministic routing may not properly account for this phenomenon. We propose refinements to these methods based on Whitt's variability functions. Results of numerical experiments on simple networks and semiconductor manufacturing process show significant improvement in the approximation of expected waiting time at bottleneck stations. © 2005 Wiley Periodicals, Inc. Naval Research Logistics, 2005.  相似文献   
116.
基于蚁群算法的防空C3I系统火力分配模型研究   总被引:1,自引:0,他引:1  
针对当前火力分配问题实现难度大的特点,分析各种火力分配优化方法的优缺点,运用新型蚁群算法尝试解决WTA问题。建立了基于蚁群算法的火力分配优化模型,描述了解火力分配问题的一般步骤,通过实例给出了算法,解决了WTA问题。并与匈牙利法相比较,结果表明该方法的合理性和有效性,特别是在武器—目标数较大时,其效率要高于常用的匈牙利法。  相似文献   
117.
首先用矩量法精确分析了考虑互耦影响时天线阵元的电流分布,给出了计算电流的解析式,并仿真计算了单元直线阵的电流分布。然后以等效网络法为基础研究互耦影响存在时修正MUSIC算法的DOA估计性能,仿真实验表明在互耦影响存在时MUSIC算法失效,而修正MUSIC算法仍然具有良好的DOA估计性能。  相似文献   
118.
多目标规划是一类重要的优化模型,有着广泛的实际应用,但其求解至今仍是运筹学的一个难点.针对一般约束多目标优化问题,在设计了新的适应度函数和选择算子的基础上,提出一种新型多目标遗传算法.将其应用于导弹对集群目标射击效能优化问题,验证了算法的有效性.  相似文献   
119.
军事通信的安全保密是国防建设中的重要问题,如何确保重要信息的安全也就成为各方关注的一个重点,采用密码技术对信息加密是最常用、最有效的安全保护手段.在介绍密码学基本概念以及Shannon 保密通信模型的基础上,分析了对称密码算法和公钥密码算法的优点及其在应用中注意的问题,最后对密码算法的发展及其应用的未来做出展望.  相似文献   
120.
在对炮兵作战地域进行地形分析的基础上,提出运用蚂蚁聚类算法选取炮兵阵地的方法.针对炮兵阵地配置的特殊要求,将模糊数学中的隶属度概念引入到炮兵阵地聚类算法之中.最后通过实验分析了此方法的优缺点,对炮兵指挥决策有一定的参考价值.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号