首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   607篇
  免费   116篇
  国内免费   46篇
  769篇
  2024年   1篇
  2023年   4篇
  2022年   8篇
  2021年   16篇
  2020年   14篇
  2019年   14篇
  2018年   11篇
  2017年   26篇
  2016年   35篇
  2015年   22篇
  2014年   52篇
  2013年   52篇
  2012年   46篇
  2011年   49篇
  2010年   33篇
  2009年   59篇
  2008年   28篇
  2007年   40篇
  2006年   52篇
  2005年   39篇
  2004年   29篇
  2003年   25篇
  2002年   14篇
  2001年   20篇
  2000年   16篇
  1999年   7篇
  1998年   7篇
  1997年   5篇
  1996年   7篇
  1995年   8篇
  1994年   5篇
  1993年   3篇
  1992年   2篇
  1991年   8篇
  1990年   9篇
  1989年   3篇
排序方式: 共有769条查询结果,搜索用时 15 毫秒
321.
提出了一种MIMO定量反馈理论与特征值配置相结合的鲁棒解耦控制方法,该方法首先利用特征值配置使系统达到性能指标要求,通过对特征向量的限制实现MIMO系统解耦,然后利用QFT方法使其具备鲁棒性.通过对某型飞机侧向通道的仿真表明:该方法不仅解耦效果良好,而且具有较强的鲁棒性.  相似文献   
322.
BP神经网络和D-S证据理论的目标识别   总被引:6,自引:0,他引:6  
目标识别是指挥自动化系统的一个重要组成部分,针对现代战争对抗手段不断增强的特点,运用BP神经网络和D-S证据理论探索作战飞机机型的识别方法.前端采用3层BP神经网络结构,以传感器接收数据为输入,以神经网络输出作为证据,后端对不同传感器的证据按D-S理论进行融合,得到待识别目标的识别概率.经由MATLAB编程对国内外几种主要机型的识别进行仿真研究,与现行目标识别方法相比较,能够更快速、准确、可靠地识别飞机目标,较好地满足了空战中作战指挥系统对飞机机型识别的需求.  相似文献   
323.
从研究航空兵对地空导弹突防作战背景出发,建立了地空导弹对突防飞机的威胁评估指标体系,并运用灰色系统理论,结合非线性树形分布权值分配法的应用,构建了基于多层次灰色理论的地空导弹对突防飞机的威胁评估模型,最后通过实例,对模型的有效性进行了检验.  相似文献   
324.
利用遗传算法求解装备调拨中的路径优化问题和运输装载问题,并利用MATLAB进行了实例仿真,对装备调拨的辅助决策具有积极的意义。  相似文献   
325.
Atomic Obsession: Nuclear Alarmism from Hiroshima to Al Qaeda, by John Mueller. Oxford University Press, 2009. 336 pages, $27.95.

Les armes nucléaires: Mythes et réalités [Nuclear Weapons: Myths and Realities], by Georges Le Guelte. Actes Sud, 2009. 390 pages, [euro]25.  相似文献   
326.
Since 9/11, counterinsurgency is back in fashion; the ‘war on terror’ has even been branded a ‘global counterinsurgency’. However the context within which counterinsurgency originally arose is critical to understanding the prospects for its present success; the radically changed environment in which it is currently being conducted casts into considerable doubt the validity of the doctrine's application by many national militaries currently ‘rediscovering’ this school of military thought today. Above all, classical counterinsurgency was a profoundly imperial, state-centric phenomenon; consequently it only rarely faced the thorny issue of sovereignty and legitimacy which bedevils and may doom these same efforts today.  相似文献   
327.
This paper examines the insurgency in Nepal (1996–2008) from a military theoretical point of view. It looks at the insurgency from André Beaufre's exterior/interior framework, which is modified to match postmodern conflicts. Simultaneously the importance of the political is underlined. The author critically examines the relevance of the Maoist label the movement and insurgency have received. He claims that the insurgency became a hybrid consisting of Chinese, Latin American, and Leninist thoughts wrapped in pragmatic/revisionists and nationalist ideas. The author also suggests that the ability of insurgents – or counter-insurgents – to combine the effects of the exterior and interior is more likely to constitute the key centre of gravity of a conflict than any single political, economic, or military factor.  相似文献   
328.
The contest-theoretic literature on the attack and defense of networks of targets focuses primarily on pure-strategy Nash equilibria. Hausken's 2008 European Journal of Operational Research article typifies this approach, and many of the models in this literature either build upon this model or utilize similar techniques. We show that Hausken's characterization of Nash equilibrium is invalid for much of the parameter space examined and provides necessary conditions for his solution to hold. The complete characterization of mixed-strategy equilibria remains an open problem, although there exist solutions in the literature for special prominent cases.  相似文献   
329.
A defender wants to detect as quickly as possible whether some attacker is secretly conducting a project that could harm the defender. Security services, for example, need to expose a terrorist plot in time to prevent it. The attacker, in turn, schedules his activities so as to remain undiscovered as long as possible. One pressing question for the defender is: which of the project's activities to focus intelligence efforts on? We model the situation as a zero‐sum game, establish that a late‐start schedule defines a dominant attacker strategy, and describe a dynamic program that yields a Nash equilibrium for the zero‐sum game. Through an innovative use of cooperative game theory, we measure the harm reduction thanks to each activity's intelligence effort, obtain insight into what makes intelligence effort more effective, and show how to identify opportunities for further harm reduction. We use a detailed example of a nuclear weapons development project to demonstrate how a careful trade‐off between time and ease of detection can reduce the harm significantly.  相似文献   
330.
Colin Gray once lamented the absence of a ‘Mahan for the final frontier’ and spacepower theory in strategic studies. This article proposes the command of space as the fundamental concept of spacepower theory, and that Mahan himself has much to offer in the endeavour of spacepower theory-making than has hitherto been realised. The theory is advanced by tempering versions of the ‘command of space’, stressing its educational intent, and explaining the nuanced sub-concepts of space control and denial through understanding some precedents set by seapower theory. In the process, aspects of Mahanian and Corbettian seapower theory are unified.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号