排序方式: 共有196条查询结果,搜索用时 15 毫秒
81.
陈志才 《系统工程与电子技术》1991,(10)
战术防空指挥控制仿真模型较多,本文针对防空导弹群指挥控制系统的需要,选择介绍一些主要的仿真模型:通信网络模型、自然环境模型、目标攻击模型、空情获取模型和导弹拦截模型。 相似文献
82.
赵青 《系统工程与电子技术》1991,(12)
为了提高对飞行器刚体飞行弹道的数字仿真速度,在计算方法上,本文提出用Hamming方法和改进的转移矩阵法来代替传统的Runge-Kutta方法,并根据某型号导弹的设计,在微型计算机上编制了一套数字仿真程序包,实算结果表明本文所提的计算方法是合理的,计算速度和精度都符合要求。 相似文献
83.
In the paper the homomorphisms of generalized de Bruijn-Good graphs aredescribed in detail and all homomorphisms of de Bruijn-Good graphs are giveu as anexample. 相似文献
84.
本文提出一种交互式多目标满意群决策方法。该方法用多目标满意决策方法帮助各决策人和群体进行多目标决策分析,用满足一集公理的加权和函数集结各决策人的偏好以及各目标的愿望值,从而形成群体的愿望值,并逐个求得群体的满意解。可克服构造决策人效用函数和人际间效用比较的困难,可用于一类群决策问题的分析求解。 相似文献
85.
In this paper we give weaker conditions to ensure the strong uniform consis-tency of multi-dimensional nearest neighbor (N.N.) estimates with non-uniform kernel andobtain the convergence rates of these estimates on an arbitrary bounded set. The ratescan not be improved in some sense. Obviously, the problem of strong convergence rates ata given point is its special case. The range of applications of estimates is extended. 相似文献
86.
Image Mosaicing Algorithm for Rolled Fingerprint Construction 总被引:1,自引:0,他引:1
IntroductionFingerprint identification is the most importantbiometric technique for automated personalauthentication[1,2 ] .In the past,fingerprints used inidentification systems were acquired by applyingink to the fingers and rolling each finger from nai… 相似文献
87.
LIU Baoding GU Jifa Institute of Systems Science Academia Sinica Beijing P. R. China 《系统科学与系统工程学报(英文版)》1993,(3)
In this paper,we consider the inventory system with a bounded emergency order,using aprobablility criterion.It is shown that there exist two critical numbers critical number x and x such that the optimalemergency order policy is order-up-to-x with a bound and the optimal regular order policy is order-up-to-x. 相似文献
88.
A method for solving nonlinear polynomial equations is given which avoids theappearance of redundant factors as in the previous characteristic set method developed bythe present author. The new method seems thus to be of much higher efficiency than theprevious one. It has the further advantage that numerical data may be inserted at willeither at the outset or during the procedure so far removal of factors by divisions may beavoided. 相似文献
89.
After a brief review of the basic notions the paper defines the G~L-structuresand their partial ordering. On this basis, the paper proves the necessary and sufficientconditions for G~L-structures to form bounded lattices. 相似文献
90.