首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   338篇
  免费   106篇
  国内免费   29篇
  473篇
  2024年   2篇
  2023年   8篇
  2022年   7篇
  2021年   5篇
  2020年   15篇
  2019年   6篇
  2018年   11篇
  2017年   30篇
  2016年   30篇
  2015年   21篇
  2014年   28篇
  2013年   30篇
  2012年   32篇
  2011年   32篇
  2010年   24篇
  2009年   29篇
  2008年   23篇
  2007年   26篇
  2006年   24篇
  2005年   19篇
  2004年   6篇
  2003年   8篇
  2002年   10篇
  2001年   11篇
  2000年   8篇
  1999年   6篇
  1998年   5篇
  1997年   2篇
  1996年   3篇
  1995年   2篇
  1994年   2篇
  1993年   2篇
  1991年   1篇
  1990年   2篇
  1989年   2篇
  1988年   1篇
排序方式: 共有473条查询结果,搜索用时 0 毫秒
151.
This article examines a problem faced by a firm procuring a material input or good from a set of suppliers. The cost to procure the material from any given supplier is concave in the amount ordered from the supplier, up to a supplier‐specific capacity limit. This NP‐hard problem is further complicated by the observation that capacities are often uncertain in practice, due for instance to production shortages at the suppliers, or competition from other firms. We accommodate this uncertainty in a worst‐case (robust) fashion by modeling an adversarial entity (which we call the “follower”) with a limited procurement budget. The follower reduces supplier capacity to maximize the minimum cost required for our firm to procure its required goods. To guard against uncertainty, the firm can “protect” any supplier at a cost (e.g., by signing a contract with the supplier that guarantees supply availability, or investing in machine upgrades that guarantee the supplier's ability to produce goods at a desired level), ensuring that the anticipated capacity of that supplier will indeed be available. The problem we consider is thus a three‐stage game in which the firm first chooses which suppliers' capacities to protect, the follower acts next to reduce capacity from unprotected suppliers, and the firm then satisfies its demand using the remaining capacity. We formulate a three‐stage mixed‐integer program that is well‐suited to decomposition techniques and develop an effective cutting‐plane algorithm for its solution. The corresponding algorithmic approach solves a sequence of scaled and relaxed problem instances, which enables solving problems having much larger data values when compared to standard techniques. © 2013 Wiley Periodicals, Inc. Naval Research Logistics, 2013  相似文献   
152.
In a rendezvous search problem, two players are placed in a network and must try to meet each other in the least possible expected time. We look at rendezvous search on a discrete interval in which the players are initially placed using independent draws (usually assumed to be from the same distribution). Some optimal solutions are known if this distribution is uniform, and also for certain other special types of distribution. In this article, we present two new results. First, we characterize the complete set of solutions for the uniform case, showing that all optimal strategies must have two specific properties (namely, of being swept and strictly geodesic). Second, we relate search strategies on the interval to proper binary trees, and use this correspondence to derive a recurrence relation for solutions to the symmetric rendezvous problem for any initial distribution. This relation allows us to solve any such problem computationally by dynamic programming. Finally, some ideas for future research are discussed. © Wiley Periodicals, Inc. Naval Research Logistics 60: 454–467, 2013  相似文献   
153.
Kovenock and Roberson's (2012a, b) replication of Hausken’s (2008a) equations and parameter restrictions do not enhance our insight into the defense and attack of reliability systems. This reply intends to fill the remaining understanding gaps.  相似文献   
154.
In fiscal year 1999, the US Air Force introduced a bonus program designed to encourage longer enlistment terms. This regime shift provides a unique opportunity to estimate the elasticity of labor supply at a new margin: the length of the employment contract. A $5000 bonus differential is estimated to increase the probability that a recruit will choose a 6‐year enlistment over a 4‐year enlistment by 30 percentage points. The program is found to be cost‐effective relative to other policies to increase man‐years.  相似文献   
155.
在混合对策理论的基础上,将空战过程看作是由一系列离散的状态组成的离散事件动态系统,建立了空战过程的离散状态子模型,利用空战态势指数和战机空战能力指数构造了战术评估函数,以完成对战术动作的筛选工作,并结合3DOF质点模型设计了机动指令生成器,实现对无人机运动状态的控制,并在Matlab环境下对机动实例进行了仿真.  相似文献   
156.
根据电场的作用机理,提出保障场的概念,从场思维的角度构建装备保障力量配置分析的优化模型;并进一步定量分析与定性判断相结合,提出装备保障力量配置优化的流程,最后结合实例具体分析。研究结果对装备保障的部署决策具有一定参考价值和指导意义。  相似文献   
157.
对敌后侦察反军事诱骗的远程火力打击战法的定量分析是战役研究中尚未解决的关键问题之一,根据信息作战原理,运用仿真和统计学分析的混合方法,建立基于概率的二人非零和(TPNZS)非合作博弈模型,设计基于侦察与诱骗博弈的远程火力打击战法,定量分析我方的敌后侦察和敌方的军事诱骗对远程信息与火力联合打击能力的影响,并对一个典型实例的初步试验及分析结果表明:与敌后侦察和军事诱骗有关的正确识别目标和错误识别目标的概率以及远程火力命中目标的概率是评估远程信息与火力联合打击能力的关键,而对评估结果进行博弈分析则是远程火力打击战法设计的关键,用识别正确目标和错误目标能力以及远程火力命中目标能力描述的基于敌后侦察与诱骗博弈的远程火力最优打击战法为Δ*=(0,Δ2*,1-Δ2*)=(0.0000,0.7727,0.2273),被打击方对远程火力打击的最优战法为π*=(π1*,0,1-π1*)=(0.8511,0.0000,0.1489)。  相似文献   
158.
鉴于干扰效果/效益评估在雷达干扰资源优化分配中的重要地位,提出了一种基于云模型和匈牙利算法的雷达干扰资源优化分配模型。利用一维云模型单条件单规则发生器和逆向云发生器构建了评估指标干扰效果推理器,利用基于风险态度因子的云模型映射函数定义了云模型之间距离的度量方法。提出了一种基于云模型与逼近理想解法的雷达干扰效益矩阵求解方法,最后运用匈牙利算法实现了干扰资源优化分配。将所建模型应用到干扰资源分配中,结果表明该模型能够较好的处理评估中的不确定性知识,是合理、可行的。  相似文献   
159.
《防务技术》2022,18(11):2097-2106
The target's threat prediction is an essential procedure for the situation analysis in an aerial defense system. However, the traditional threat prediction methods mostly ignore the effect of commander's emotion. They only predict a target's present threat from the target's features itself, which leads to their poor ability in a complex situation. To aerial targets, this paper proposes a method for its potential threat prediction considering commander emotion (PTP-CE) that uses the Bi-directional LSTM (BiLSTM) network and the backpropagation neural network (BP) optimized by the sparrow search algorithm (SSA). Furthermore, we use the BiLSTM to predict the target's future state from real-time series data, and then adopt the SSA-BP to combine the target's state with the commander's emotion to establish a threat prediction model. Therefore, the target's potential threat level can be obtained by this threat prediction model from the predicted future state and the recognized emotion. The experimental results show that the PTP-CE is efficient for aerial target's state prediction and threat prediction, regardless of commander's emotional effect.  相似文献   
160.
Search theory originates from the military research efforts of WWII. Most researchers of that period modeled their search games in noncooperative games, where players are enemies or compete against each other. In this article, we deal with a cooperative search game, where multiple searchers behave cooperatively. First we describe several search problems and discuss the possibility of a coalition or cooperation among searchers. For the cooperative search game, we define a function named quasi‐characteristic function, which gives us a criterion similar to the so‐called characteristic function in the general coalition game with transferable utility. The search operation includes a kind of randomness with respect to whether the searchers can detect a target and get the value of the target. We also propose a methodology to divide the obtained target value among members of the coalition taking account of the randomness. As a concrete problem of the cooperative search game, we take the so‐called search allocation game, where searchers distribute their searching resources to detect a target in a cooperative way and the target moves in a search space to evade the searchers. Lastly, we discuss the core of the cooperative search allocation game. © 2009 Wiley Periodicals, Inc. Naval Research Logistics, 2009  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号