首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   628篇
  免费   106篇
  国内免费   51篇
  2024年   1篇
  2023年   4篇
  2022年   11篇
  2021年   14篇
  2020年   15篇
  2019年   14篇
  2018年   10篇
  2017年   27篇
  2016年   35篇
  2015年   22篇
  2014年   43篇
  2013年   54篇
  2012年   53篇
  2011年   56篇
  2010年   35篇
  2009年   61篇
  2008年   27篇
  2007年   42篇
  2006年   54篇
  2005年   43篇
  2004年   32篇
  2003年   27篇
  2002年   12篇
  2001年   16篇
  2000年   16篇
  1999年   8篇
  1998年   7篇
  1997年   5篇
  1996年   6篇
  1995年   8篇
  1994年   3篇
  1993年   3篇
  1992年   2篇
  1991年   8篇
  1990年   9篇
  1989年   2篇
排序方式: 共有785条查询结果,搜索用时 171 毫秒
31.
针对航空电子设备无失效数据可靠性分析问题,提出了weibull分布下基于Bayes理论的无失效数据分析方法,基于分层Bayes思想建立了模型,推导出可靠性参数后验分布计算公式,结合实例,验证了方法的有效性,结果表明,此方法计算结果符合工程实际,在其他电子设备可靠性分析中,有一定的借鉴意义.  相似文献   
32.
粗糙集理论作为一种新的处理含糊和不确定性问题的数学工具,已成为国际学术界的一个前沿的研究领域.传统的粗糙集理论只能对数据库中的离散属性进行处理,而绝大多数现实的数据库既包含了离散属性,又包含了连续属性.针对传统粗糙集理论的这一缺陷,提出了一种改进的基于断点重要性的属性离散化方法.最后,通过实例分析说明该方法是有效的.  相似文献   
33.
基于数字地图的威胁空间建模与仿真   总被引:1,自引:0,他引:1  
利用雷达地形遮蔽盲区进行低空突防对敌人地面目标进行攻击是航迹规划关键技术之一.在综合考虑作战区域地形、敌方防空力量等因素条件下,应用人工势场理论对威胁空间的威胁级别进行量化处理,建立了战区势场模型.通过仿真证明,该模型更加符合真实的战场环境,为战斗机任务规划特别是航迹规划提供了参考依据.  相似文献   
34.
In this article, we develop a novel electric power supply chain network model with fuel supply markets that captures both the economic network transactions in energy supply markets and the physical network transmission constraints in the electric power network. The theoretical derivation and analysis are done using the theory of variational inequalities. We then apply the model to a specific case, the New England electric power supply chain, consisting of six states, five fuel types, 82 power generators, with a total of 573 generating units, and 10 demand market regions. The empirical case study demonstrates that the regional electric power prices simulated by our model match the actual electricity prices in New England very well. We also compute the electric power prices and the spark spread, an important measure of the power plant profitability, under natural gas and oil price variations. The empirical examples illustrate that in New England, the market/grid‐level fuel competition has become the major factor that affects the influence of the oil price on the natural gas price. Finally, we utilize the model to quantitatively investigate how changes in the demand for electricity influence the electric power and the fuel markets from a regional perspective. The theoretical model can be applied to other regions and multiple electricity markets under deregulation to quantify the interactions in electric power/energy supply chains and their effects on flows and prices. © 2009 Wiley Periodicals, Inc. Naval Research Logistics, 2009  相似文献   
35.
Todas information and communication network requires a design that is secure to tampering. Traditional performance measures of reliability and throughput must be supplemented with measures of security. Recognition of an adversary who can inflict damage leads toward a game‐theoretic model. Through such a formulation, guidelines for network designs and improvements are derived. We opt for a design that is most robust to withstand both natural degradation and adversarial attacks. Extensive computational experience with such a model suggests that a Nash‐equilibrium design exists that can withstand the worst possible damage. Most important, the equilibrium is value‐free in that it is stable irrespective of the unit costs associated with reliability vs. capacity improvement and how one wishes to trade between throughput and reliability. This finding helps to pinpoint the most critical components in network design. From a policy standpoint, the model also allows the monetary value of information‐security to be imputed. © 2009 Wiley Periodicals, Inc. Naval Research Logistics, 2009  相似文献   
36.
基于灰色系统理论的火灾事故预测方法   总被引:2,自引:0,他引:2  
简要叙述应用灰色系统理论进行火灾事故预测的理论和方法 ,建立了火灾事故预测的GM (1,1)模型 ,并用该模型对火灾事故进行预测。  相似文献   
37.
In this paper, we derive new families of facet‐defining inequalities for the finite group problem and extreme inequalities for the infinite group problem using approximate lifting. The new valid inequalities for the finite group problem include two‐ and three‐slope facet‐defining inequalities as well as the first family of four‐slope facet‐defining inequalities. The new valid inequalities for the infinite group problem include families of two‐ and three‐slope extreme inequalities. These new inequalities not only illustrate the diversity of strong inequalities for the finite and infinite group problems, but also provide a large variety of new cutting planes for solving integer and mixed‐integer programming problems. © 2008 Wiley Periodicals, Inc. Naval Research Logistics, 2008  相似文献   
38.
This article deals with a two‐person zero‐sum game called a search allocation game (SAG), in which a searcher and a target participate as players. The searcher distributes his searching resources in a search space to detect the target. The effect of resources lasts a certain period of time and extends to some areas at a distance from the resources' dropped points. On the other hand, the target moves around in the search space to evade the searcher. In the history of search games, there has been little research covering the durability and reachability of searching resources. This article proposes two linear programming formulations to solve the SAG with durable and reachable resources, and at the same time provide an optimal strategy of distributing searching resources for the searcher and an optimal moving strategy for the target. Using examples, we will analyze the influences of two attributes of resources on optimal strategies. © 2007 Wiley Periodicals, Inc. Naval Research Logistics 2008  相似文献   
39.
Cyberspace is an avenue of approach through which a military force can attain objectives of value. Through these cyber avenues of approach, military forces can engage, vet, organize, and direct human agents to accomplish specific activities. Although the objectives of these activities could differ from traditional military objectives, they still have military relevance. This particular manifestation of cyber conflict is neither a new domain of war nor something outside of warfare. Rather, it can be viewed as an emerging avenue of approach in the larger context of military operations, auguring benefits in the integration of cyber activities with operations.  相似文献   
40.
针对导弹系统安全性评价的不确定性问题,提出了将灰色关联和D-S证据理论相结合的方法,从人员安全性、设备安全性和环境安全性建立了综合评估指标体系,用灰色关联分析处理了指标之间的关联性。在传统证据合成公式的基础上,考虑证据集非关键因素的权重,给出了修正的证据合成公式。并以打靶选弹为例进行了计算分析,得出了导弹安全性优先级排序,并将改进算法与传统计算方法的结果进行了比较,验证了评价模型的可行性与实用性,为导弹系统的管理工作提供了有益的参考。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号