首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   431篇
  免费   163篇
  国内免费   27篇
  2023年   3篇
  2022年   5篇
  2021年   14篇
  2020年   11篇
  2019年   14篇
  2018年   4篇
  2017年   24篇
  2016年   31篇
  2015年   23篇
  2014年   41篇
  2013年   24篇
  2012年   27篇
  2011年   45篇
  2010年   23篇
  2009年   39篇
  2008年   29篇
  2007年   32篇
  2006年   31篇
  2005年   35篇
  2004年   30篇
  2003年   17篇
  2002年   15篇
  2001年   19篇
  2000年   17篇
  1999年   12篇
  1998年   12篇
  1997年   7篇
  1996年   8篇
  1995年   3篇
  1994年   1篇
  1993年   5篇
  1992年   5篇
  1991年   3篇
  1990年   5篇
  1989年   3篇
  1988年   3篇
  1987年   1篇
排序方式: 共有621条查询结果,搜索用时 31 毫秒
181.
针对一类含有未知非线性函数项和外界干扰的不确定纯反馈非线性系统,提出了一种自适应模糊反推近似滑模变结构控制方法。采用中值定理和隐函数定理使未知非仿射输入函数拥有显式的控制输入,利用模糊系统逼近未知非线性函数,动态面控制技术解决了反推设计中出现的"微分爆炸"问题。所提出的自适应近似滑模控制方案削弱了传统滑模控制中的抖振现象。从理论上证明了所设计的控制器能够保证闭环系统所有信号半全局一致终结有界。仿真算例验证了算法的有效性。  相似文献   
182.
Nuclear deterrence and cyber war seem almost antithetical in their respective intellectual pedigrees. Nuclear weapons are unique in their ability to create mass destruction in a short time. Information or “cyber” weapons, at least for the most part, aim at sowing confusion or mass disruption instead of widespread physical destruction. Nevertheless, there are some intersections between cyber and nuclear matters, and these have the potential to become troublesome for the future of nuclear deterrence. For example, cyber attacks might complicate the management of a nuclear crisis. As well, information attacks on command-control and communications systems might lead to a mistaken nuclear launch based on false warnings, to erroneous interpretations of data or to panic on account of feared information blackout. It is not inconceivable that future nuclear strike planning will include a preliminary wave of cyber strikes or at least a more protracted “preparation of the battlefield” by roaming through enemy networks to plant malware or map vulnerabilities.  相似文献   
183.
In this article, we study how to derive bounds for the reliability and the expected lifetime of a coherent system with heterogeneous ordered components. These bounds can be used to compare the performance of the systems obtained by permuting the components at a given system structure, that is, to study where we should place the different components at a system structure to get the most reliable system. Moreover, a similar procedure is applied to get bounds for mixtures and for the generalized proportional hazard rate model when the baseline populations are ordered. © 2017 Wiley Periodicals, Inc. Naval Research Logistics 64: 108–116, 2017  相似文献   
184.
Stochastic network design is fundamental to transportation and logistic problems in practice, yet faces new modeling and computational challenges resulted from heterogeneous sources of uncertainties and their unknown distributions given limited data. In this article, we design arcs in a network to optimize the cost of single‐commodity flows under random demand and arc disruptions. We minimize the network design cost plus cost associated with network performance under uncertainty evaluated by two schemes. The first scheme restricts demand and arc capacities in budgeted uncertainty sets and minimizes the worst‐case cost of supply generation and network flows for any possible realizations. The second scheme generates a finite set of samples from statistical information (e.g., moments) of data and minimizes the expected cost of supplies and flows, for which we bound the worst‐case cost using budgeted uncertainty sets. We develop cutting‐plane algorithms for solving the mixed‐integer nonlinear programming reformulations of the problem under the two schemes. We compare the computational efficacy of different approaches and analyze the results by testing diverse instances of random and real‐world networks. © 2017 Wiley Periodicals, Inc. Naval Research Logistics 64: 154–173, 2017  相似文献   
185.
This study addresses the allocation of matched active redundancy components to coherent systems with base components having statistically dependent lifetimes. We consider base component lifetimes and redundancy component lifetimes which are both stochastic arrangement monotone with respect to a pair of components given the lifetimes of the other components. In this context, allocating a more reliable redundancy component to the weaker base component is shown to incur a stochastically larger system lifetime. Numerical examples are presented as an illustration of the theoretical results.  相似文献   
186.
针对高可靠微处理器软容错设计,提出了一种新的可靠性度量标准,增强的平均无失效工作量,以解决现有度量标准没有综合考虑性能、面积、功耗开销带来的可靠性降低的缺点;提出了一种评估方法对增强的平均无失效工作量以及两种控制流检测技术进行定量评估。评估结果表明,软硬件结合的控制流检测技术较好地折中了可靠性、性能、面积和功耗。量化评估指标全面考虑了多种开销对微处理器可靠性的影响,采用相应的评估方法可以更加准确地对微处理器可靠性加固手段进行定量评估,以指导设计探索和设计优化。  相似文献   
187.
Arms transfers provide exporters an avenue to provide security to other states while gaining economic benefits. Arms transfers provide importers an avenue to gain security without having to rely on alliances. Past research uses aggregate measures of the monetary or security value of major weapon system transfers without accounting for strategic differences in possible use in interstate and civil conflict. This article presents a data set on interstate transfers of major weapon systems between 1950 and 2010 building upon Stockholm Peach Research Institute’s Arms Trade Register with several improvements. First, it disaggregates land weapons and air weapons into categories reflecting their strategic capabilities. Second, model level characteristics (e.g. age, speed, and range) are drawn from Jane’s Defence sources. Additionally, the data set covers a larger range of time and states than previous data sets categorizing arms. To demonstrate the usefulness, this article first presents summary statistics of the data set and then replicates an earlier test to show that the effect of human rights and regime types on United States transfers differs across the categories of arms compared to alternative measures of arms transfers.  相似文献   
188.
针对群系统编队跟踪问题,提出一种满足线性二次型调节器性能指标的优化控制方法。建立编队跟踪问题的数学描述和设计编队跟踪控制协议。给出群系统实现编队跟踪的充要条件,借助李雅普诺夫第二方法分析系统的稳定性。得到了控制协议能够最小化线性二次型调节器性能指标的拓扑条件,设计了编〖BHDWG8,WK10YQ,DK1*2,WK1*2D〗〖XCWL.TIF;%129%129〗听语音 聊科研与作者互动 队跟踪算法。仿真实验验证了控制方法的有效性。  相似文献   
189.
《防务技术》2022,18(10):1842-1851
In this study, the approximate and exact solutions for the stationary-state of the solids model with neglecting reactant consumption for both non-uniform and uniform temperature systems were applied on gas ignition under a constant pressure condition. The criticality conditions for a slab, an infinite cylinder, and a sphere are determined and discussed using dimensionless temperatures under constant ambient and surface temperatures for a non-uniform temperature system. Exact solution for a Semenov model with convection heat loss was also presented. The solution of the Semenov problem for constant volume or density as a solid and constant pressure were compared. The critical parameter δ is calculated and compared with those of Frank-Kamenetskii solution values. The validation of the calculated ignition temperatures with other exact solution and experimental results were offered. The relation between critical parameters form Semenov and F.K. models solution was introduced.  相似文献   
190.
电视制导过程中随着弹目距离的减小,目标图像会呈现尺度的非线性放大,现在传统的目标检测方法,不能满足目标尺度的精确变化,导致目标定位偏差,且检测计算量大,无法达到实时性。本文将基于剩余谱的显著性检测方法融入Adaboost检测过程,并应用于电视制导图像的目标检测中,能够对海面或沙漠等背景较为单一的区域进行快速目标检测,且检测窗口能够准确适应目标尺度的变化。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号