首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   138篇
  免费   8篇
  国内免费   32篇
  2024年   1篇
  2022年   1篇
  2021年   3篇
  2020年   1篇
  2019年   1篇
  2017年   13篇
  2016年   18篇
  2015年   7篇
  2014年   13篇
  2013年   11篇
  2012年   16篇
  2011年   16篇
  2010年   5篇
  2009年   12篇
  2008年   8篇
  2007年   8篇
  2006年   15篇
  2005年   9篇
  2004年   5篇
  2003年   7篇
  2002年   1篇
  2001年   3篇
  1999年   2篇
  1997年   1篇
  1992年   1篇
排序方式: 共有178条查询结果,搜索用时 15 毫秒
171.
为了快速准确地对装甲分队作战单元面临的目标进行威胁度判断,提高信息化装甲分队作战辅助决策水平,建立了基于Vague集的极值记分函数评估模型,且构造了适合威胁评估的记分函数。实例分析表明,该模型可有效地完成目标威胁评估与排序,为分队火力优化控制提供重要数据支持。  相似文献   
172.
Due to expanding and increasing religious extremism and terrorism coupled with political instability in Pakistan, most western observers believe that Pakistan's nuclear weapons are not secure and could be taken over by terrorists. This would have adverse implications for the region and for global peace, especially for the security of USA and Europe. This article argues that this perception is based on a flawed understanding and knowledge of how Pakistan's command and control setup has evolved and operates. Pakistan's nuclear weapons are as safe as any other state's nuclear weapons. Pakistan has also been active in supporting and participating in global efforts to improve nuclear safety and security. Over the years, Pakistan has been quite open in sharing information regarding how it is improving its command and control system with western governments as well as scholars. This article argues that the steps Pakistan has taken to secure its nuclear weapons are adequate and that Pakistan would continue to further strengthen these measures; however, it is the expanding religious extremism, terrorism and anti-Americanism in the country which make the international perception of Pakistan extremely negative and then seep into the perception of Pakistan's nuclear weapons safety and security.  相似文献   
173.
A Markov chain approach to detecting a threat in a given surveillance zone by a network of steerable sensors is presented. The network has a finite number of predetermined states, and transition from one state to another follows a Markov chain. Under the assumption that the threat avoids detection, two game theoretic problems for finding an optimal Markov chain (two surveillance strategies) are formulated: the first maximizes the probability of threat detection for two consecutive detection periods, whereas the second minimizes the average time of detection for the worst‐case threat's trajectory. Both problems are reduced to linear programming, and special techniques are suggested to solve them. For a dynamic environment with moving noise sources, the optimal Markov chain changes at each detection period, and the rate of convergence of the Markov chain to its stationary distribution is analyzed. Both surveillance strategies are tested in numerical experiments and compared one with another. © 2011 Wiley Periodicals, Inc. Naval Research Logistics, 2011  相似文献   
174.
威胁评估模型是反导指挥控制系统中的关键模型之一.在分析和研究反导作战指挥控制问题的基础上,重点对TBM威胁评估的影响因素进行了分析总结;对各级反导指挥控制系统的威胁评估模型中的异同点进行了对比分析.最后结合层次分析法的相关理论给出了战区级反导指控系统威胁评估模型的求解过程.该算法在指控系统仿真应用中取得了较好的效果.对后续反导作战指挥控制问题的研究具有很高的参考价值.  相似文献   
175.
为了分析和把握防空导弹作战面临的复杂电磁环境(CEME)态势,分析并建立了防空导弹作战CEME威胁模型;提出了防空导弹作战CEME威胁势概念,从态和势两方面深入分析了防空导弹作战CEME威胁势内涵,建立了防空导弹作战CEME威胁势函数模型;提出了基于集对分析(SPA)的防空导弹作战CEME威胁势评估新方法。论文研究对防空导弹作战电磁态势评估和电子对抗进程推演具有非常重要的理论指导意义和军事应用价值。  相似文献   
176.
直觉模糊集理论已获得广泛的应用。全面总结了直觉模糊理论在信息融合领域的应用情况。分析了直觉模糊理论的研究现状与研究进展,介绍了在态势估计与威胁评估方面的应用情况,研究了在信息融合第一级处理中应用的基本原理与方法,展望了在信息融合领域各级的应用前景。  相似文献   
177.
依据防空反导作战理论和目标分配的要求,对防空导弹反TBM作战指挥中目标分配的关键问题进行了研究。分别对威胁排序方法、拦截可行性条件、目标分配原则和目标分配算法进行了分析,提出了一种反TBM作战指挥中目标分配问题的算法,最后讨论了目标分配的评价问题。通过实际应用表明此方法是切实可行的。  相似文献   
178.
ABSTRACT

While the drone has become synonymous with the War on Terror, the asymmetric iconography of the battlefield is shifting. Commercially available off-the-shelf (COTS) drones are increasingly prevalent features of global battlefields, employed by non-state actors in both visualising such spaces, and the directing and inflicting of harm. As such usage increases, so too do concerns around their evolving adoption, adaptation, and potential portability into homeland spheres. While cognizant of the range of positive drone applications, it is asserted that drones nonetheless remain simultaneously bound to an inverse potential for exploitation. In examining drone risk, this article approaches the consumer drone through a series of sites and spaces through which it is technically and socially constructed. Reflecting upon industry innovation, community-driven experimentation, and evolving airspace – it calls for greater attention to the drone’s malleability, arguing that understandings of COTS drones must remain attentive to both drone potential and potential drone threat.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号