首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   497篇
  免费   188篇
  国内免费   21篇
  2024年   2篇
  2023年   4篇
  2022年   18篇
  2021年   15篇
  2020年   13篇
  2019年   12篇
  2018年   7篇
  2017年   46篇
  2016年   38篇
  2015年   22篇
  2014年   32篇
  2013年   39篇
  2012年   49篇
  2011年   31篇
  2010年   43篇
  2009年   38篇
  2008年   38篇
  2007年   36篇
  2006年   35篇
  2005年   29篇
  2004年   36篇
  2003年   22篇
  2002年   11篇
  2001年   14篇
  2000年   13篇
  1999年   10篇
  1998年   10篇
  1997年   7篇
  1996年   8篇
  1995年   9篇
  1994年   6篇
  1993年   1篇
  1992年   3篇
  1991年   3篇
  1990年   4篇
  1989年   2篇
排序方式: 共有706条查询结果,搜索用时 187 毫秒
161.
受美军开展战场区域导航系统研究的启发,思考分析了我国北斗卫星导航系统面临的军事威胁和固有脆弱性,建议有必要基于伪卫星技术构建空地一体战场区域导航系统,以此作为北斗卫星导航系统在区域范围内的备份系统,并基于有人机控制无人机协同作战的理念阐述了系统的组成构想和行动构想,分析了系统的相关关键技术。  相似文献   
162.
为了研究分段履带式水陆两栖车的水动力性能,实现减阻增速,将尾翼板安装到水陆两栖车的方艉部,并开展了水池试验和仿真研究,两者的研究结果具有较好的一致性。通过仿真研究了车体的纵向重心位置、尾翼板的长度和角度对水陆两栖车阻力性能的影响,并分析了阻力成分的变化趋势。研究结果表明:车体纵向重心位置在540~560 mm 时,车体所受水阻力最小;在速度为3~5 m/s时,长度为156 mm,与水平面夹角为10°的尾翼板减阻效果最明显,相比于原裸车体的阻力,减阻率达到34.3%;加装尾翼板可以增加车体的尾部中空区长度,相当于增加了水线长,增大了长宽比。该研究表明:适当调节重心位置和优化尾翼板参数,可以有效实现水陆两栖车的减阻增速。  相似文献   
163.
We consider the burglar problem in which a burglar can either retire or choose among different types of burglaries, with each type having its own success probability and reward distribution. Some general structural results are established and, in the case of exponentially distributed reward distributions, a solution technique is presented. The burglar problem's relationship to a stochastic knapsack problem with a random exponentially distributed knapsack capacity is shown. © 2014 Wiley Periodicals, Inc. Naval Research Logistics 61: 359–364, 2014  相似文献   
164.
In this article, we address a stochastic generalized assignment machine scheduling problem in which the processing times of jobs are assumed to be random variables. We develop a branch‐and‐price (B&P) approach for solving this problem wherein the pricing problem is separable with respect to each machine, and has the structure of a multidimensional knapsack problem. In addition, we explore two other extensions of this method—one that utilizes a dual‐stabilization technique and another that incorporates an advanced‐start procedure to obtain an initial feasible solution. We compare the performance of these methods with that of the branch‐and‐cut (B&C) method within CPLEX. Our results show that all B&P‐based approaches perform better than the B&C method, with the best performance obtained for the B&P procedure that includes both the extensions aforementioned. We also utilize a Monte Carlo method within the B&P scheme, which affords the use of a small subset of scenarios at a time to estimate the “true” optimal objective function value. Our experimental investigation reveals that this approach readily yields solutions lying within 5% of optimality, while providing more than a 10‐fold savings in CPU times in comparison with the best of the other proposed B&P procedures. © 2014 Wiley Periodicals, Inc. Naval Research Logistics 61: 131–143, 2014  相似文献   
165.
竖立状态的运载火箭一旦遭遇地震,极易造成箭体倾倒等灾难性后果。为了确保运载火箭在地震中的安全,针对某型运载火箭,采用时程分析法对其进行地震响应分析,得到了火箭的弯矩、位移响应峰值沿箭体纵向的分布规律。分析了火箭关键位置处弯矩响应的频域特性,设计了火箭的减震措施,并分析了火箭与发射台的连接刚度、隔震支座刚度对火箭地震响应的影响规律。结果表明:火箭弯矩响应的最大值发生在靠近火箭尾段的位置,位移响应的最大值发生在火箭头部位置;改变火箭与发射台连接刚度以及在发射台底部加装隔震支座的方式可以有效地减小火箭的地震响应。  相似文献   
166.
由于移动Ad Hoc网络具有无需基础设施,可以快速部署,很难完全被摧毁等优点,被作为数字化战场通信的优先选择,设计实现了一种适用于低速率移动Ad Hoc网络的安全路由协议——LSRP,它适用于分层架构的低速移动电台自组网,可以在网络资源有限的情况下,防御来自外部和内部两方面的攻击。LSRP协议利用分布式门限RSA签名方案来阻止非授权接入,防范来自网络外部的攻击;利用邻节点信任度评估机制,进行恶意节点检测和剪除,防范来自网络内部的攻击,增强了网络的安全性。  相似文献   
167.
Unlike most of the literature, this paper includes domestic political considerations in which two countries must decide defensive countermeasures against a common terrorist threat. A delegation problem arises as voters strategically choose a policymaker whose preferences differ from their own. As a consequence, countries limit the presumed oversupply of defensive countermeasures. Thus, the inclusion of domestic politics gives a new perspective on counterterrorism. The timing of elections is also shown to make a difference.  相似文献   
168.
This comment addresses the Rohlfs–Sullivan analysis titled: ‘The Cost-Effectiveness of Armored Tactical Wheeled Vehicles [TWVs] for Overseas US Army Operations.’ The analysis evaluated policies to replace Type 1 and 2 TWVs with Type 3s. There is no evidence the analysis factored in fatality causes, fatality relationships to vehicles, or compared survivability of vehicles. Furthermore, it did not note when Type 3 TWVs were requested, when they impacted fatalities, or TWV use policies. It also assumed Type 3 TWVs prompted negative unit behaviors while discounting evidence of positive behaviors. In summary, the analysis is incomplete and should be revised.  相似文献   
169.
针对履带车辆下长坡制动过程中不同制动力的分配关系,在液力减速器和整车下坡动力学分析的基础上,研究了基于液力辅助制动的履带车辆下长坡制动控制策略,建立了基于SIMULINK的履带车辆整车动态仿真模型,对液力减速器的持续制动性能和控制策略的有效性进行了仿真.结果表明,车辆下坡持续制动时,适时应用液力减速器,能够有效分流整车制动功率,明显降低机械制动器的工作负荷,满足整车安全恒速下坡的要求.  相似文献   
170.
Automated responses are an inevitable aspect of cyberwarfare, but there has not been a systematic treatment of the conditions in which they are morally permissible. We argue that there are three substantial barriers to the moral permissibility of an automated response: the attribution, chain reaction, and projection bias problems. Moreover, these three challenges together provide a set of operational tests that can be used to assess the moral permissibility of a particular automated response in a specific situation. Defensive automated responses will almost always pass all three challenges, while offensive automated responses typically face a substantial positive burden in order to overcome the chain reaction and projection bias challenges. Perhaps the most interesting cases arise in the middle ground between cyber-offense and cyber-defense, such as automated cyber-exploitation responses. In those situations, much depends on the finer details of the response, the context, and the adversary. Importantly, however, the operationalizations of the three challenges provide a clear guide for decision-makers to assess the moral permissibility of automated responses that could potentially be implemented.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号