首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   306篇
  免费   6篇
  2021年   5篇
  2020年   3篇
  2019年   18篇
  2018年   10篇
  2017年   7篇
  2016年   6篇
  2015年   6篇
  2014年   6篇
  2013年   58篇
  2010年   5篇
  2009年   4篇
  2008年   7篇
  2007年   3篇
  2006年   2篇
  2005年   2篇
  2004年   6篇
  2003年   4篇
  2002年   3篇
  2001年   4篇
  2000年   4篇
  1998年   5篇
  1997年   4篇
  1996年   9篇
  1995年   4篇
  1994年   2篇
  1992年   2篇
  1990年   2篇
  1989年   5篇
  1988年   5篇
  1986年   7篇
  1985年   6篇
  1984年   6篇
  1983年   2篇
  1982年   4篇
  1981年   5篇
  1980年   10篇
  1979年   4篇
  1978年   6篇
  1977年   4篇
  1976年   5篇
  1975年   6篇
  1974年   4篇
  1973年   2篇
  1972年   3篇
  1971年   8篇
  1970年   4篇
  1969年   4篇
  1968年   5篇
  1967年   4篇
  1966年   6篇
排序方式: 共有312条查询结果,搜索用时 859 毫秒
31.
Models are formulated for determining continuous review (Q, r) policies for a multiitem inventory subject to constraints. The objective function is the minimization of total time-weighted shortages. The constraints apply to inventory investment and reorder workload. The formulations are thus independent of the normal ordering, holding, and shortage costs. Two models are presented, each representing a convex programming problem. Lagrangian techniques are employed with the first, simplified model in which only the reorder points are optimized. In the second model both the reorder points and the reorder quantities are optimized utilizing penalty function methods. An example problem is solved for each model. The final section deals with the implementation of these models in very large inventory systems.  相似文献   
32.
The minimum storage‐time sequencing problem generalizes many well‐known problems in combinatorial optimization, such as the directed linear arrangement and the problem of minimizing the weighted sum of completion times, subject to precedence constraints on a single processor. In this paper we propose a new lower bound, based on a Lagrangian relaxation, which can be computed very efficiently. To improve upon this lower bound, we employ a bundle optimization algorithm. We also show that the best bound obtainable by this approach equals the one obtainable from the linear relaxation computed on a formulation whose first Chvàtal closure equals the convex hull of all the integer solutions of the problem. © 2001 John Wiley & Sons, Inc. Naval Research Logistics 48: 313–331, 2001  相似文献   
33.
This paper develops and applies a nonparametric bootstrap methodology for setting inventory reorder points and a simple inequality for identifying existing reorder points that are unreasonably high. We demonstrate that an empirically based bootstrap method is both feasible and calculable for large inventories by applying it to the 1st Marine Expeditionary Force General Account, an inventory consisting of $20–30 million of stock for 10–20,000 different types of items. Further, we show that the bootstrap methodology works significantly better than the existing methodology based on mean days of supply. In fact, we demonstrate performance equivalent to the existing system with a reduced inventory at one‐half to one‐third the cost; conversely, we demonstrate significant improvement in fill rates and other inventory performance measures for an inventory of the same cost. © 2000 John Wiley & Sons, Inc. Naval Research Logistics 47: 459–478, 2000  相似文献   
34.
We consider a reader—writer system consisting of a single server and a fixed number of jobs (or customers) belonging to two classes. Class one jobs are called readers and any number of them can be processed simultaneously. Class two jobs are called writers and they have to be processed one at a time. When a writer is being processed no other writer or readers can be processed. A fixed number of readers and writers are ready for processing at time 0. Their processing times are independent random variables. Each reader and writer has a fixed waiting cost rate. We find optimal scheduling rules that minimize the expected total waiting cost (expected total weighted flowtime). We consider both nonpreemptive and preemptive scheduling. The optimal nonpreemptive schedule is derived by a variation of the usual interchange argument, while the optimal schedule in the preemptive case is given by a Gittins index policy. These index policies continue to be optimal for systems in which new writers enter the system in a Poisson fashion. © 1998 John Wiley & Sons, Inc. Naval Research Logistics 45: 483–495, 1998  相似文献   
35.
This article deals with investigating the effect of cut-outs on the natural frequencies of magneto-electro-elastic (MEE) plates incorporating finite element methods based on higher order shear deformation theory (HSDT). In order to consider the influence of cut-out, the energy of the cut-out domain is sub-tracted from the total energy of the entire plate. The governing equations of motions are derived through incorporating Hamilton's principle and the solution is obtained using condensation technique. The proposed numerical formulation is verified with the results of previously published literature as well as the numerical software. In addition, this research focuses on evaluating the effect of geometrical skewness and boundary conditions on the frequency response. The influence of cut-outs on the degree of coupling between magnetic, electric and elasticfields is also investigated.  相似文献   
36.
In order to examine the possibility to improve its camouflage properties standard cotton fabric with camouflage print was impregnated with poly(vinyl butyral), PVB and fullerene-like nanoparticles of tungsten disulfide, PVB/IF-WS2. FTIR analysis excluded any possible chemical interaction of IF-WS2 with PVB and the fabric. The camouflage behavior of the impregnated fabric has been examined firstly in the VIS part of the spectrum. Diffuse reflection, specular gloss and color coordinates were measured for three different shades (black, brown and dark green). Thermal imaging was applied to examine the camouflage abilities of this impregnation in IR part of the spectrum. The obtained results show that PVB/IF-WS2 impregnation system induced enhacement of the materials camouflage properties, i.e. that IF-WS2 have a positive effect on spectrophotometric characteristics of the fabric.  相似文献   
37.
In nuclear nonproliferation negotiations, many governments pursue multiple objectives, and changes in policy can occur rapidly—and often unexpectedly. For these reasons, understanding nonproliferation requires empathy and imagination rather than just historical fact. This article considers one teaching tool to encourage such insight—simulations—and demonstrates how teaching and scholarship can interact to improve our understanding of the complex decisions and negotiations involved in nuclear nonproliferation. The article consists of five parts: first, it explains the benefits of simulations as both a policy development tool in Washington and as a teaching tool in universities; second, it describes the pedagogical strategy of the Stanford University simulation program; third, it shows how the simulations have identified and highlighted theoretical and substantive insights that are often neglected in scholarly studies of nonproliferation; and fourth, it describes how students are tested to enhance the learning experience from the simulation. Fifth and finally, the article provides concluding observations about how using simulations in the classroom can help scholars develop insights that improve their understanding of real-world nuclear negotiation dynamics and outcomes.  相似文献   
38.
ABSTRACT

An arms race in cyberspace is underway. US and Western government efforts to control this process have largely been limited to deterrence and norm development. This article examines an alternative policy option: arms control. To gauge whether arms-control models offer useful lessons for addressing cyber capabilities, this article compiles a new dataset of predominantly twentieth-century arms-control agreements. It also evaluates two case studies of negotiated agreements that regulate dual-use technologies, the 1928 Geneva Protocol prohibiting chemical- and biological-weapon use and the 1944 Chicago Convention on International Civil Aviation. The analysis underscores the limits of norm development for emerging technologies with both civilian and military applications. It finds lessons for developing verifiable, international cooperation mechanisms for cyberwarfare in the regulatory model of international aviation. Conventionally, arms-control agreements take advantage of transparent tests or estimates of arms. To restrict cyberwarfare activities, experts and policy makers must adapt arms-control models to a difficult-to-measure technology at an advanced stage of development and use. Further investigation of international regulatory schemes for dual-use technology of similar diffusion and development to the internet, such as international civil aviation, is needed.  相似文献   
39.
The popular adage has it that ‘prevention is better than cure’. Given the heavy and enduring costs of armed conflicts, there is no disputing the fact that making efforts to prevent them from breaking out in the first place is better than waiting until it is too late. This entails two things: conflict prevention measures and early warning systems. Anything that could be done to effectively address the root causes of a conflict before it turns violent may fit into the former, while the latter aims to identify threats to these elements so that effective conflict prevention measures can be taken. In other words, ensuring ‘human security’ is the thrust of the former, while the latter serves as a surveillance camera for any deficit in providing the different components of this ‘human security’. It is with these two important issues that this essay deals, with particular reference to West Africa.  相似文献   
40.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号