首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   161篇
  免费   55篇
  国内免费   9篇
  225篇
  2024年   2篇
  2023年   4篇
  2022年   2篇
  2021年   2篇
  2020年   6篇
  2019年   4篇
  2018年   6篇
  2017年   19篇
  2016年   19篇
  2015年   4篇
  2014年   9篇
  2013年   15篇
  2012年   14篇
  2011年   12篇
  2010年   10篇
  2009年   17篇
  2008年   10篇
  2007年   10篇
  2006年   13篇
  2005年   10篇
  2004年   3篇
  2003年   2篇
  2002年   3篇
  2001年   8篇
  2000年   4篇
  1999年   3篇
  1998年   1篇
  1997年   1篇
  1996年   4篇
  1994年   2篇
  1993年   2篇
  1991年   1篇
  1990年   2篇
  1989年   1篇
排序方式: 共有225条查询结果,搜索用时 15 毫秒
1.
火力运用对策空间模型   总被引:1,自引:0,他引:1  
根据空 -地作战的特点 ,提出了软、硬火力单位的概念 ,根据模型提出了作战指数、生存指数 ,为双方的实力与“保卫目标”的安全度分析提供了数量依据 ;根据微分对策和战术原则提出了规范作战模式等概念 ,为构造火力运用、兵力数量需求等算法搭起一个框架。  相似文献   
2.
Wildfire managers use initial attack (IA) to control wildfires before they grow large and become difficult to suppress. Although the majority of wildfire incidents are contained by IA, the small percentage of fires that escape IA causes most of the damage. Therefore, planning a successful IA is very important. In this article, we study the vulnerability of IA in wildfire suppression using an attacker‐defender Stackelberg model. The attacker's objective is to coordinate the simultaneous ignition of fires at various points in a landscape to maximize the number of fires that cannot be contained by IA. The defender's objective is to optimally dispatch suppression resources from multiple fire stations located across the landscape to minimize the number of wildfires not contained by IA. We use a decomposition algorithm to solve the model and apply the model on a test case landscape. We also investigate the impact of delay in the response, the fire growth rate, the amount of suppression resources, and the locations of fire stations on the success of IA.  相似文献   
3.
王磊  苏金波 《国防科技》2018,39(3):096-099,113
由于契约的不完全性、专用性资产的存在,导致民企参军的谈判过程中,一方可能利用另一方因专用性资产投资的锁定效应,而采取机会主义行为将另一方套牢,攫取可占用专用性准租金。这种套牢风险不是单向的,而是双向的,双向套牢风险的存在不仅会降低军品科研生产项目建设质量,而且还会严重挫伤民营企业承担军品科研生产任务的积极性。为有效防范双向套牢风险,本文将从博弈论的角度,建立民营企业与军队采办部门的期望收益与专用性资产投资的函数关系和博弈矩阵,分阶段讨论民营企业与军队采办部门所面临的套牢风险大小及各自的最佳行为选择。以降低民企参军面临的套牢风险,引导更多优势民营企业进入军品科研生产与维修领域,推动军民融合的深度发展。  相似文献   
4.
Firms form various alliances or use brand extensions to enter new markets in order to improve their operational efficiency and create a positive spillover. However, they do not always know the implications of these strategies for market entry and multimarket competition because the sale of products in one market can have negative spillover effects on product sales in other markets. We present an analytical framework to examine whether and how (i.e., by choosing alliance entry or independent entry) competing firms should enter a market in a situation where market spillovers occur when a firm enters a spillover-producing market to sell products that may increase or decrease the consumers' willingness to pay for products in the primary market. Our analysis shows that the operational efficiency (or quality differentiation ability) of firms in a spillover-producing market varies, and hence, the impact of market spillovers differs for firms. We identify the key factors, such as bargaining power, brand value difference in the primary market, and the extent of efficiencies and spillovers, that determine the firms benefitting from the different entry strategies. Specifically, we show that firms would be more willing to choose an alliance strategy to enter a spillover-producing market if the negative spillover is small and alliance efficiency is high. In contrast, if an alliance entry is not favored, the firms' relative operational efficiency is crucial for them to decide whether to enter the market independently under moderate spillover conditions. Finally, we show the implications of market entry strategies for managers.  相似文献   
5.
Todas information and communication network requires a design that is secure to tampering. Traditional performance measures of reliability and throughput must be supplemented with measures of security. Recognition of an adversary who can inflict damage leads toward a game‐theoretic model. Through such a formulation, guidelines for network designs and improvements are derived. We opt for a design that is most robust to withstand both natural degradation and adversarial attacks. Extensive computational experience with such a model suggests that a Nash‐equilibrium design exists that can withstand the worst possible damage. Most important, the equilibrium is value‐free in that it is stable irrespective of the unit costs associated with reliability vs. capacity improvement and how one wishes to trade between throughput and reliability. This finding helps to pinpoint the most critical components in network design. From a policy standpoint, the model also allows the monetary value of information‐security to be imputed. © 2009 Wiley Periodicals, Inc. Naval Research Logistics, 2009  相似文献   
6.
简要介绍了军事虚拟仓库及其组织结构形式.以及博弈论的相关知识。结合军事后勤系统的特点,采用完全信息静态博弈纳什均衡的方法分析了军事虚拟仓库的组织结构模式,在假设的合理的条件下模拟3种组织形式的博弈过程。通过各个模型的最终纳什均衡,指出了3种组织结构形式运作的结果和其积极因素、消极因素、噪声构成.结合我军现有的后勤保障体制,提出现行保障体制的合理与不合理的地方,并给出了改进方案,对优化全军后方仓库布局及管理和战备物资储备及应急保障有着重要意义,可以为总部决策提供咨询建议。  相似文献   
7.
This paper deals with a two searchers game and it investigates the problem of how the possibility of finding a hidden object simultaneously by players influences their behavior. Namely, we consider the following two‐sided allocation non‐zero‐sum game on an integer interval [1,n]. Two teams (Player 1 and 2) want to find an immobile object (say, a treasure) hidden at one of n points. Each point i ∈ [1,n] is characterized by a detection parameter λi (μi) for Player 1 (Player 2) such that pi(1 ? exp(?λixi)) (pi(1 ? exp(?μiyi))) is the probability that Player 1 (Player 2) discovers the hidden object with amount of search effort xi (yi) applied at point i where pi ∈ (0,1) is the probability that the object is hidden at point i. Player 1 (Player 2) undertakes the search by allocating the total amount of effort X(Y). The payoff for Player 1 (Player 2) is 1 if he detects the object but his opponent does not. If both players detect the object they can share it proportionally and even can pay some share to an umpire who takes care that the players do not cheat each other, namely Player 1 gets q1 and Player 2 gets q2 where q1 + q2 ≤ 1. The Nash equilibrium of this game is found and numerical examples are given. © 2006 Wiley Periodicals, Inc. Naval Research Logistics, 2007  相似文献   
8.
Analytical resolution of search theory problems, as formalized by B.O. Koopman, may be applied with some model extension to various resource management issues. However, a fundamental prerequisite is the knowledge of the prior target density. Though this assumption has the definite advantage of simplicity, its drawback is clearly that target reactivity is not taken into account. As a preliminary step towards reactive target study stands the problem of resource planning under a min–max game context. This paper is related to Nakai's work about the game planning of resources for the detection of a stationary target. However, this initial problem is extended by adding new and more general constraints, allowing a more realistic modeling of the target and searcher behaviors. © 2007 Wiley Periodicals, Inc. Naval Research Logistics, 2007  相似文献   
9.
给出了制定药物效用鉴定的序贯抽样检验方案,对未用的同类药品进行随机抽样,利用抽样结果,对剩下的N-n个样品的性能进行推断,得到判断药品是否失效的抽样方法以及有效的抽样截断方案,在减小抽样量的前提下,准确的判断药物是否有效.并对该序贯抽样性能的优劣与固定样本最优检验方法进行了比较,得到在犯同样错误的前提下,序贯抽样检验的样本量比固定样本最优检验的样本量小的多.  相似文献   
10.
一种确定检测时间的方法   总被引:1,自引:0,他引:1  
在许多作为侦察用的无源传感器只报出其检测结果时,利用此传感器一系列检测报告确定被检测目标何时进入及何时离开此传感器检测区域,成为解决决策级信尽融合问题的关键。本文讨论了一种利用序贯分析方法计算检测时间的近似方法。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号