首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   397篇
  免费   126篇
  国内免费   29篇
  552篇
  2024年   3篇
  2023年   3篇
  2022年   9篇
  2021年   8篇
  2020年   18篇
  2019年   22篇
  2018年   16篇
  2017年   37篇
  2016年   33篇
  2015年   22篇
  2014年   40篇
  2013年   48篇
  2012年   39篇
  2011年   26篇
  2010年   20篇
  2009年   25篇
  2008年   18篇
  2007年   22篇
  2006年   18篇
  2005年   22篇
  2004年   29篇
  2003年   14篇
  2002年   9篇
  2001年   6篇
  2000年   11篇
  1999年   2篇
  1998年   2篇
  1997年   4篇
  1996年   8篇
  1995年   5篇
  1993年   4篇
  1992年   3篇
  1991年   3篇
  1990年   2篇
  1989年   1篇
排序方式: 共有552条查询结果,搜索用时 15 毫秒
181.
针对机械臂路径规划问题,提出一种基于改进RRT算法的路径规划方法。改进RRT结合了目标偏置策略和贪婪生长策略的优点,在随机采样时,以一定概率使采样点偏置为目标节点,降低随机采样的盲目性,在目标节点方向上采用贪婪式扩展策略,增加随机树局部方向上的生长速度。RRT法规划路径结果并非最优,提出改进GPP法删除多余路径节点,优化机械臂运动路径。通过与Biased-RRT和Greedy-RRT数值仿真结果对比,证明了改进RRT在计算时间、迭代次数、扩展节点数上均优于以上方法。在机械臂两种典型工作环境中的仿真结果表明,使用该方法可以较好解决排爆机械臂避障路径规划问题。  相似文献   
182.
基于传感器网络数据融合的目标定位方法   总被引:1,自引:0,他引:1  
针对传感器网络测试系统在战场及终点效应中的应用,探讨了基于多种传感器网络的目标定位方法,提出了采用最优加权融合估计算法将各种传感器的定位信息进行融合处理,并将融合结果与各种传感器计算结果进行比较,结果证明了经融合处理可以大大提高定位精度.  相似文献   
183.
在飞弹武器使用中,进行弹道分配,通常要采用避免平面交叉方法优化弹道分配结果.但由于弹道分组限制的存在,经常出现无法完成分配的现象.针对这一问题,在建立数学模型的基础上,提出了一种新的优选策略.该策略优先考虑是否可以完成分配,采用从靶点到起射点、飞弹这样一个逆序的分配过程,有效解决了该问题.  相似文献   
184.
基于D矩阵的舰船电子装备综合诊断方法   总被引:1,自引:0,他引:1  
针对舰船电子装备综合诊断实现要求,提出一种基于故障-测试依赖性关系(D)矩阵的综合诊断方法,利用同一D矩阵分别完成对舰船电子装备的测试性分析评估、测试诊断需求分配、诊断测试序列生成和诊断信息的共享,实现舰船电子装备综合诊断各过程诊断信息模型的一致.该方法已在某舰载电子装备综合诊断实现中得到验证和应用.  相似文献   
185.
Order picking accounts for most of the operating expense of a typical distribution center, and thus is often considered the most critical function of a supply chain. In discrete order picking a single worker walks to pick all the items necessary to fulfill a single customer order. Discrete order picking is common not only because of its simplicity and reliability, but also because of its ability to pick orders quickly upon receipt, and thus is commonly used by e‐commerce operations. There are two primary ways to reduce the cost (walking distance required) of the order picking system. First is through the use of technology—conveyor systems and/or the ability to transmit order information to pickers via mobile units. Second is through the design—where best to locate depots (where workers receive pick lists and deposit completed orders) and how best to lay out the product. We build a stochastic model to compare three configurations of different technology requirements: single‐depot, dual‐depot, and no‐depot. For each configuration we explore the optimal design. © 2008 Wiley Periodicals, Inc. Naval Research Logistics, 2008  相似文献   
186.
AirSea Battle (ASB) has generated significant publicity, controversy, and debate among scholars, analysts, commentators, and observers of US defense strategy. However, a research gap exists concerning formal analysis of the impact of the operational concept on the relationship between the US Air Force (USAF) and the US Navy (USN). The impact of the ASB operational concept on the USAF–USN relationship is examined across the issue areas of strategy, budgets, weapons procurement, and training. These four issue areas represent important areas of historical conflict and competition between the Air Force and Navy. The conclusion is that ASB is ushering in a new era of Air Force–Navy partnership that advances the inter-service dynamic from “jointness” toward integration. The emergent USAF–USN partnership therefore represents a significant development in US defense politics and defense strategy.  相似文献   
187.
矩阵变换器自抗扰控制策略研究   总被引:2,自引:0,他引:2  
矩阵变换器的输出电压易受各种因素的影响,为了改善输出性能,将自抗扰控制技术应用于矩阵变换器的闭环控制中。分析了自抗扰控制器的特性,提出了一种双闭环自抗扰控制策略,即电流内环与电压外环均采用一阶简化的自抗扰控制算法。仿真结果表明:该方法不仅可以有效地抑制多种扰动的影响,而且比PI控制具有更优的动静态性能,可满足高性能矩阵变换器系统的控制要求。  相似文献   
188.
The terrorist attacks in France and Belgium of 2015–2016 that occurred while these countries were in a heightened state of alert raise questions about indications and warning methodology as well as effectiveness of the blanket-protection deployment of security services assisted even by the military. Response and perhaps even more anticipation may require strategic rethinking in light of the predatory attacks that target the most vulnerable spots of the public space. This study looks at threat analysis in Belgium as conducted through her intelligence fusion centre Coordination Unit for Threat Analysis (CUTA)?????? since its inception in 2006. With a special focus on what is known, at the time of writing, about the terrorist attacks in Paris and Brussels, this study hopes to put into context how the system (mal)functions and will also consider the preventive measures that respond to the threat, and the international aspects which have implications far beyond Belgian borders. Therefore, a case is made for not just a Belgian homeland security framework, but one that fits into an EU-wide security concept.  相似文献   
189.
There is a growing view that the emerging brand of Chinese regional diplomacy in recent years is increasingly assertive. This article attempts to make better sense of this perceived more forceful Chinese diplomacy. It argues that Chinese regional behavior is more profitably understood through the lens of a two-pronged foreign policy strategy that combines two particular aspects. One is a tougher and more uncompromising approach toward issues that China regards as concerning its core interests. The other is a more flexible and cooperative position toward interests that, while significant, are of secondary importance.  相似文献   
190.
This article distills insights for the scholarship of deterrence by examining the 1983 nuclear crisis – the moment of maximum danger of the late Cold War. Important contributions notwithstanding, our understanding of this episode still has caveats, and a significant pool of theoretical lessons for strategic studies remain to be learned. Utilizing newly available sources, this article suggests an alternative interpretation of Soviet and US conduct. It argues that the then US deterrence strategy almost produced Soviet nuclear overreaction by nearly turning a NATO exercise into a prelude to a preventive Soviet attack. Building on historical findings, this article offers insights about a mechanism for deterrence effectiveness evaluation, recommends establishing a structure responsible for this endeavor, and introduces a new theoretical term to the strategic studies lexicon – a ‘culminating point of deterrence’.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号