全文获取类型
收费全文 | 474篇 |
免费 | 247篇 |
国内免费 | 56篇 |
出版年
2024年 | 6篇 |
2023年 | 10篇 |
2022年 | 12篇 |
2021年 | 10篇 |
2020年 | 20篇 |
2019年 | 19篇 |
2018年 | 11篇 |
2017年 | 43篇 |
2016年 | 54篇 |
2015年 | 30篇 |
2014年 | 53篇 |
2013年 | 32篇 |
2012年 | 54篇 |
2011年 | 48篇 |
2010年 | 37篇 |
2009年 | 49篇 |
2008年 | 32篇 |
2007年 | 29篇 |
2006年 | 60篇 |
2005年 | 31篇 |
2004年 | 21篇 |
2003年 | 14篇 |
2002年 | 17篇 |
2001年 | 12篇 |
2000年 | 6篇 |
1999年 | 13篇 |
1998年 | 8篇 |
1997年 | 3篇 |
1996年 | 7篇 |
1995年 | 5篇 |
1994年 | 5篇 |
1993年 | 5篇 |
1992年 | 3篇 |
1991年 | 5篇 |
1990年 | 6篇 |
1989年 | 6篇 |
1988年 | 1篇 |
排序方式: 共有777条查询结果,搜索用时 0 毫秒
371.
372.
针对少量强核构成的片上多核处理器,设计了一种非阻塞双向环结构。该结构包含5层3种不同类型的环链路层,分别用于传输命令、大量数据以及小量数据;采用源路由方式,设计专门的拥塞控制网络,防止报文的相互覆盖;路由器采用无缓冲无阻塞结构,单节拍通过环的每个跳步,以降低环的传输延迟并实现可预知的确定延迟传输。针对环的链路距离长、位宽大的挑战,通过实验选择了合理的中继器插入方法,并采用相邻导线交替插入反相器以及信号线反向交错排布等串扰优化方法,对环进行物理设计和长链路进行延时优化。最终实现结果表明,所设计的环达到了1 GHz的工作主频,并具备高达256 GByte/s的链路带宽,完全满足高性能数字信号处理的需求。 相似文献
373.
针对正交各向异性材料的二维非线性热传导反问题,采用顺序函数法进行表面热流辨识问题的研究。在求解反问题时,采用有限体积法、牛顿-拉夫逊法并引入未来时间步的概念。在每个时间步内,将待辨识热流视为非线性方程组的未知量,通过一个迭代过程进行求解。算例的研究表明,热流辨识结果与真实热流相近,从而证明了本方法在辨识二维非线性热传导反问题时是准确、稳定、有效的。 相似文献
374.
兵力部署优化问题是防空指控系统的重要研究内容之一。针对多型防空武器多层多区段混合部署问题,对异型空袭武器和防空武器基于作战效能标准化处理,基于排队论给出空袭武器的突防概率计算模型,将防空武器系统综合防御效能作为优化目标,建立多型防空武器扇形部署优化模型。仿真实验验证了优化模型的有效性和合理性,可为科学制定兵力部署方案提供参考。 相似文献
375.
针对中近程反导的具体要求,分析了典型的驱护编队反导模式下编群队形特点,研究了指挥舰与护卫舰的队形关联性,探讨了基于信息化作战模式的抗饱和攻击能力,建立了基于多目标优化的最保守与最乐观情况下的抗饱和攻击模型,得到舰艇编队协同防空的系统效能,对驱护编队防空反导指挥决策具有很强的参考价值。 相似文献
376.
针对现有频域近似熵频谱感知技术在低信噪比条件下抗噪声性能和检测性能有待提升的问题,提出了一种基于LMD频域近似熵的频谱感知算法。(1)算法筛选出3个PF分量累加求和,使得算法提取局部调频包络特征信息得到最优,进一步排除噪声不确定度的影响。(2)算法对累加PF分量进行频域变换后求其近似熵,增强算法对频域信息的嗅探能力,提升算法检测性能。Monte Carlo仿真结果表明,在噪声不确定度为0dB,采样点数为8 000的情况下,当信噪比大于-19 d B时,可以对2ASK信号达到100%的检测概率,与现有频域近似熵算法相比,检测性能约有17 d B的提升。 相似文献
377.
378.
Non‐zero‐sum nonlinear network path interdiction with an application to inspection in terror networks
下载免费PDF全文
![点击此处可从《海军后勤学研究》网站下载免费的PDF全文](/ch/ext_images/free.gif)
Noam Goldberg 《海军后勤学研究》2017,64(2):139-153
A simultaneous non‐zero‐sum game is modeled to extend the classical network interdiction problem. In this model, an interdictor (e.g., an enforcement agent) decides how much of an inspection resource to spend along each arc in the network to capture a smuggler. The smuggler (randomly) selects a commodity to smuggle—a source and destination pair of nodes, and also a corresponding path for traveling between the given pair of nodes. This model is motivated by a terrorist organization that can mobilize its human, financial, or weapon resources to carry out an attack at one of several potential target destinations. The probability of evading each of the network arcs nonlinearly decreases in the amount of resource that the interdictor spends on its inspection. We show that under reasonable assumptions with respect to the evasion probability functions, (approximate) Nash equilibria of this game can be determined in polynomial time; depending on whether the evasion functions are exponential or general logarithmically‐convex functions, exact Nash equilibria or approximate Nash equilibria, respectively, are computed. © 2017 Wiley Periodicals, Inc. Naval Research Logistics 64: 139–153, 2017 相似文献
379.
We consider a problem of optimal division of stock between a logistic depot and several geographically dispersed bases, in a two‐echelon supply chain. The objective is to minimize the total cost of inventory shipment, taking into account direct shipments between the depot and the bases, and lateral transshipments between bases. We prove the convexity of the objective function and suggest a procedure for identifying the optimal solution. Small‐dimensional cases, as well as a limit case in which the number of bases tends to infinity, are solved analytically for arbitrary distributions of demand. For a general case, an approximation is suggested. We show that, in many practical cases, partial pooling is the best strategy, and large proportions of the inventory should be kept at the bases rather than at the depot. The analytical and numerical examples show that complete pooling is obtained only as a limit case in which the transshipment cost tends to infinity. © 2017 Wiley Periodicals, Inc. Naval Research Logistics, 64: 3–18, 2017 相似文献
380.
We study two‐agent scheduling on a single sequential and compatible batching machine in which jobs in each batch are processed sequentially and compatibility means that jobs of distinct agents can be processed in a common batch. A fixed setup time is required before each batch is started. Each agent seeks to optimize some scheduling criterion that depends on the completion times of its own jobs only. We consider several scheduling problems arising from different combinations of some regular scheduling criteria, including the maximum cost (embracing lateness and makespan as its special cases), the total completion time, and the (weighted) number of tardy jobs. Our goal is to find an optimal schedule that minimizes the objective value of one agent, subject to an upper bound on the objective value of the other agent. For each problem under consideration, we provide either a polynomial‐time or a pseudo‐polynomial‐time algorithm to solve it. We also devise a fully polynomial‐time approximation scheme when both agents’ scheduling criteria are the weighted number of tardy jobs. 相似文献