咨询与建议

限定检索结果

文献类型

  • 609 篇 会议
  • 369 篇 期刊文献
  • 35 册 图书
  • 11 篇 学位论文
  • 3 篇 科技报告

馆藏范围

  • 1,027 篇 电子文献
  • 2 种 纸本馆藏

日期分布

学科分类号

  • 752 篇 工学
    • 484 篇 计算机科学与技术...
    • 231 篇 机械工程
    • 167 篇 软件工程
    • 160 篇 电气工程
    • 72 篇 航空宇航科学与技...
    • 67 篇 信息与通信工程
    • 62 篇 控制科学与工程
    • 44 篇 土木工程
    • 38 篇 建筑学
    • 37 篇 电子科学与技术(可...
    • 31 篇 测绘科学与技术
    • 28 篇 材料科学与工程(可...
    • 27 篇 力学(可授工学、理...
    • 19 篇 仪器科学与技术
    • 19 篇 动力工程及工程热...
    • 19 篇 化学工程与技术
    • 18 篇 生物工程
    • 15 篇 交通运输工程
    • 13 篇 光学工程
    • 11 篇 安全科学与工程
  • 468 篇 理学
    • 355 篇 物理学
    • 250 篇 数学
    • 35 篇 系统科学
    • 24 篇 生物学
    • 23 篇 化学
    • 14 篇 统计学(可授理学、...
  • 82 篇 管理学
    • 77 篇 管理科学与工程(可...
    • 34 篇 工商管理
  • 54 篇 军事学
    • 17 篇 军事思想及军事历...
  • 14 篇 医学
    • 11 篇 临床医学
  • 13 篇 法学
  • 11 篇 教育学
  • 4 篇 经济学
  • 3 篇 农学

主题

  • 99 篇 computational mo...
  • 72 篇 simulation
  • 41 篇 analytical model...
  • 35 篇 computer archite...
  • 34 篇 computer simulat...
  • 33 篇 modeling
  • 33 篇 modeling and sim...
  • 23 篇 application soft...
  • 21 篇 discrete event s...
  • 21 篇 mathematical mod...
  • 19 篇 systems engineer...
  • 19 篇 hardware
  • 18 篇 simulation and m...
  • 17 篇 artificial intel...
  • 17 篇 testing
  • 16 篇 real-time system...
  • 16 篇 atmospheric mode...
  • 15 篇 costs
  • 14 篇 us department of...
  • 13 篇 real time system...

机构

  • 10 篇 national univers...
  • 7 篇 国防科技大学
  • 7 篇 natl univ def te...
  • 6 篇 college of infor...
  • 6 篇 college of syste...
  • 4 篇 us air force ins...
  • 3 篇 univ def dept ta...
  • 3 篇 lab telecommun s...
  • 3 篇 colorado state u...
  • 3 篇 univ s florida t...
  • 3 篇 us air force ins...
  • 3 篇 science applicat...
  • 3 篇 us air force ins...
  • 3 篇 harbin institute...
  • 3 篇 univ texas arlin...
  • 3 篇 orlando fl unite...
  • 3 篇 amherst syst inc...
  • 3 篇 air force instit...
  • 3 篇 calculated insig...
  • 3 篇 us mil acad west...

作者

  • 7 篇 yao yiping
  • 7 篇 hodson douglas d...
  • 7 篇 grimaila michael...
  • 7 篇 zeigler bernard ...
  • 6 篇 kim tag gon
  • 6 篇 tolk andreas
  • 5 篇 tang wenjie
  • 5 篇 banks sheila b.
  • 5 篇 mikulski dariusz
  • 5 篇 stytz martin r.
  • 5 篇 national researc...
  • 5 篇 yiping yao
  • 4 篇 diallo saikou y.
  • 4 篇 gaughan chris
  • 4 篇 fureby c.
  • 4 篇 stytz mr
  • 4 篇 goerger simon r.
  • 4 篇 jonathan butts
  • 4 篇 hudas greg
  • 4 篇 sujeet shenoi

语言

  • 984 篇 英文
  • 23 篇 中文
  • 20 篇 其他
检索条件"任意字段=Modeling and Simulation for Defense Systems and Applications VI"
1027 条 记 录,以下是41-50 订阅
排序:
Towards Cn2 parity between imaging-based simulation and measurement  35
Towards Cn2 parity between imaging-based simulation and meas...
收藏 引用
Conference on Infrared Imaging systems - Design, Analysis, modeling, and Testing XXXV
作者: Watson, Thomas P. Dasgupta, Apratim Foti, Daniel Jacobs, Eddie L. Univ Memphis Memphis TN 38152 USA
Optical turbulence in the atmosphere causes defocus, blur, and wander of images captured over long distances, which can significantly degrade their quality. Turbulence is a manifestation of variations in the index of ... 详细信息
来源: 评论
PoKER: a probability of kill estimation rate model for air-to-air missiles using machine learning on stochastic targets
收藏 引用
JOURNAL OF defense modeling AND simulation-applications METHODOLOGY TECHNOLOGY-JDMS 2025年
作者: Dantas, Joao P. A. Costa, Andre N. Geraldo, Diego Maximo, Marcos R. O. A. Yoneyama, Takashi Inst Adv Studies Decis Support Syst Subdiv Trevo Coronel Aviador Jose Alberto Albano do Amara BR-12228001 Sao Jose Dos Campos SP Brazil Aeronaut Inst Technol Comp Sci Div Sao Jose Dos Campos Brazil Aeronaut Inst Technol Elect Engn Div Sao Jose Dos Campos Brazil
This work introduces PoKER, a novel probabilistic model engineered to optimize missile launch effectiveness in air-to-air scenarios, specifically within Beyond visual Range (BVR) air combat. Unlike conventional Weapon... 详细信息
来源: 评论
Using cognitive models to design dynamic task allocation systems
收藏 引用
JOURNAL OF defense modeling AND simulation-applications METHODOLOGY TECHNOLOGY-JDMS 2023年 第4期20卷 467-480页
作者: Fisher, Christopher R. Frame, Mary E. Stevens, Christopher Air Force Res Lab Wright Patterson Cub Def Wright Patterson AFB OH 45377 USA Air Force Res Lab Wright Patterson Parallax Adv Res Wright Patterson AFB OH 45377 USA Air Force Res Lab Wright Patterson Wright Patterson AFB OH 45377 USA
Many operations in Intelligence, Surveillance, and Reconnaissance (ISR) involve balancing multiple simultaneous interdependent tasks and coordinating between multiple teammates. Recently, autonomous managers (AMs) wer... 详细信息
来源: 评论
Multi-Agent Collaboration Environment simulation
Multi-Agent Collaboration Environment Simulation
收藏 引用
Synthetic Data for Artificial Intelligence and Machine Learning: Tools, Techniques, and applications 2023
作者: Haley, Joshua Tucker, Jonathan Nesper, Jonathan Daniel, Brian Fish, Trisha Elbit Systems of America: Advanced Capabilities Center 12600 Challenger Pkwy STE 155 OrlandoFL United States
Machine Learning (ML) and Artificial intelligence (AI) have increased automation potential within defense applications such as border protection, compound security, and surveillance applications. Advances in low-size ... 详细信息
来源: 评论
AI/ML Digital Twins of Hardware-in-the-Loop systems
AI/ML Digital Twins of Hardware-in-the-Loop Systems
收藏 引用
2024 NDIA Michigan Chapter Ground Vehicle systems Engineering and Technology Symposium, GVSETS 2024
作者: Colley, Wesley N. Banyai, Joel Gordy, Joshua Mills, Matthew Warren, Randall Torch Technologies Inc. HuntsvilleAL United States
Proprietary, black box, and other hard-to-model subsystems are a leading source of schedule and labor cost across simulation supported analysis and lifecycle management. Using AI/ML technologies to rapidly develop and... 详细信息
来源: 评论
Optimizing Underwater Acoustic Survey Strategies with Autonomous Underwater Vehicles: A simulation-Based Framework  21st
Optimizing Underwater Acoustic Survey Strategies with Autono...
收藏 引用
21st International Symposium on Distributed Computing and Artificial Intelligence
作者: Lagudi, Antonio Severino, Umberto Bruno, Fabio Univ Calabria Dept Mech Energet & Management Engn I-87036 Arcavacata Di Rende CS Italy
Ocean exploration and inspection missions involving underwater robotic systems have gained increasing popularity in various domains such as marine science, archaeology, and defense in recent years. However, deploying ... 详细信息
来源: 评论
24th International Conference on Embedded Computer systems: Architectures, modeling, and simulation, SAMOS 2024
24th International Conference on Embedded Computer Systems: ...
收藏 引用
24th International Conference on Embedded Computer systems: Architectures, modeling, and simulation, SAMOS 2024
The proceedings contain 38 papers. The special focus in this conference is on Embedded Computer systems: Architectures, modeling, and simulation. The topics include: QCEDA: Using Quantum Computers for EDA;Real-Ti...
来源: 评论
24th International Conference on Embedded Computer systems: Architectures, modeling, and simulation, SAMOS 2024
24th International Conference on Embedded Computer Systems: ...
收藏 引用
24th International Conference on Embedded Computer systems: Architectures, modeling, and simulation, SAMOS 2024
The proceedings contain 38 papers. The special focus in this conference is on Embedded Computer systems: Architectures, modeling, and simulation. The topics include: QCEDA: Using Quantum Computers for EDA;Real-Ti...
来源: 评论
Design Of Intelligent Countermeasure System for Power System Network Security defense
收藏 引用
JOURNAL OF ELECTRICAL systems 2023年 第4期19卷 227-240页
作者: Hang, Feilu Xie, Linjiang Zhang, Zhenhong Hu, Jian Digital Secur Ctr Informat Ctr Yunnan Power Grid Kunming 650011 Yunnan Peoples R China
In an increasingly interconnected world, the convergence of power system networks and biometric-based biomedical applications presents unique challenges for data protection and privacy. This research endeavors to conc... 详细信息
来源: 评论
Estimation of cyber network risk using rare event simulation
收藏 引用
JOURNAL OF defense modeling AND simulation-applications METHODOLOGY TECHNOLOGY-JDMS 2022年 第1期19卷 37-55页
作者: Krall, Alexander L. Kuhl, Michael E. Yang, Shanchieh J. Penn State Univ Leonhard Bldg310 South Barnard St University Pk PA 16802 USA Rochester Inst Technol Rochester NY 14623 USA
Inherent vulnerabilities in a cyber network's constituent machine services can be exploited by malicious agents. As a result, the machines on any network are at risk. Security specialists seek to mitigate the risk... 详细信息
来源: 评论