全文获取类型
收费全文 | 93篇 |
免费 | 1篇 |
出版年
2021年 | 1篇 |
2017年 | 1篇 |
2016年 | 1篇 |
2015年 | 1篇 |
2014年 | 1篇 |
2013年 | 49篇 |
2012年 | 2篇 |
2009年 | 1篇 |
2006年 | 1篇 |
2003年 | 1篇 |
2001年 | 1篇 |
2000年 | 1篇 |
1999年 | 1篇 |
1998年 | 1篇 |
1997年 | 1篇 |
1996年 | 1篇 |
1995年 | 1篇 |
1994年 | 2篇 |
1993年 | 2篇 |
1991年 | 3篇 |
1990年 | 1篇 |
1989年 | 4篇 |
1986年 | 1篇 |
1983年 | 2篇 |
1982年 | 1篇 |
1978年 | 1篇 |
1976年 | 2篇 |
1975年 | 1篇 |
1974年 | 1篇 |
1973年 | 2篇 |
1972年 | 2篇 |
1970年 | 3篇 |
排序方式: 共有94条查询结果,搜索用时 15 毫秒
31.
32.
Strategic terrorism: The framework and its fallacies 总被引:1,自引:0,他引:1
Dr Peter R. Neumann 《战略研究杂志》2013,36(4):571-595
This article seeks to lay out a comprehensive framework by which those who utilize a campaign of strategic terrorism seek to attain their ends. It identifies a distinctive modus operandi: 1) disorientation: to alienate the authorities from their citizens, reducing the government to impotence in the eyes of the population; 2) target response: to induce a target to respond in a manner that is favorable to the insurgent cause; 3) gaining legitimacy: to exploit the emotional impact of the violence to insert an alternative political message. By elucidating the strategy of terrorism, the analysis also reveals its inherent limitations. Resting on the premise that a militarily more powerful adversary will in some way feel restrained from bringing the full force of its military superiority to bear, the strategy relies exclusively on the exploitation of the psychological effects of armed action, thereby rendering it vulnerable to those who are willing to view the resolution of clashes of interest principally in terms of the tangibles of military power. 相似文献
33.
34.
A new model has been defined that enables the estimation of the lethal radius (radius of efficiency) of HE (High Explosive) artillery projectiles against human targets. The model is made of several modules: CAD (Computer Aided Design) modeling, fragment mass distribution estimation, fragment initial velocity prediction, fragment trajectory calculation, effective fragment density estimation, and high explosive projectile lethal radius estimation. The results were compared with the experimental results obtained based on tests in the arena used in our country, and the agreement of the results was good. This model can be used in any terminal-ballistics scenario for high explosive projectiles since it is general, para-metric, fast and relatively easy to implement. 相似文献
35.
We consider a generalization of the well‐known generalized assignment problem (GAP) over discrete time periods encompassed within a finite planning horizon. The resulting model, MultiGAP, addresses the assignment of tasks to agents within each time period, with the attendant single‐period assignment costs and agent‐capacity constraint requirements, in conjunction with transition costs arising between any two consecutive periods in which a task is reassigned to a different agent. As is the case for its single‐period antecedent, MultiGAP offers a robust tool for modeling a wide range of capacity planning problems occurring within supply chain management. We provide two formulations for MultiGAP and establish that the second (alternative) formulation provides a tighter bound. We define a Lagrangian relaxation‐based heuristic as well as a branch‐and‐bound algorithm for MultiGAP. Computational experience with the heuristic and branch‐and‐bound algorithm on over 2500 test problems is reported. The Lagrangian heuristic consistently generates high‐quality and in many cases near‐optimal solutions. The branch‐and‐bound algorithm is also seen to constitute an effective means for solving to optimality MultiGAP problems of reasonable size. © 2012 Wiley Periodicals, Inc. Naval Research Logistics, 2012 相似文献
36.
Alan Washburn 《海军后勤学研究》2006,53(4):354-362
The Jelinski–Moranda model of software reliability is generalized by introducing a negative‐binomial prior distribution for the number of faults remaining, together with a Gamma distribution for the rate at which each fault is exposed. This model is well suited to sequential use, where a sequence of reliability forecasts is made in the process of testing or using the software. We also investigate replacing the Gamma distribution with a worst‐case assumption about failure rates (the worst‐case failure rate in models such as this is not infinite, since faults with large failure rates are immediately discovered and removed). © 2006 Wiley Periodicals, Inc. Naval Research Logistics, 2006 相似文献
37.
Alan R. Washburn 《海军后勤学研究》1998,45(3):243-257
The problem of searching for randomly moving targets such as children and submarines is known to be fundamentally difficult, but finding efficient methods for generating optimal or near optimal solutions is nonetheless an important practical problem. This paper investigates the efficiency of Branch and Bound methods, with emphasis on the tradeoff between the accuracy of the bound employed and the time required to compute it. A variety of bounds are investigated, some of which are new. In most cases the best bounds turn out to be imprecise, but very easy to compute. © 1998 John Wiley & Sons, Inc. Naval Research Logistics 45: 243–257, 1998 相似文献
38.
Polling systems are used to model a wide variety of real-world applications, for example, telecommunication and material handling systems. Consequently, there is continued interest in developing efficient algorithms to analyze the performance of polling systems. Recent interest in the optimization of these systems has brought up the need for developing very efficient techniques for analyzing their waiting times. This article presents the Individual Station technique for cyclic polling systems. The technique possesses the following features: (a) it allows the user to compute the mean waiting time at a selected station independent of the mean waiting time computations at other stations, and (b) its complexity is low and independent of the system utilization. In addition the technique provides explicit closed-form expressions for (i) the mean waiting times in a system with 3 stations, and (ii) the second moment of the waiting times in a system with 2 stations, for an exhaustive service system. © 1996 John Wiley & Sons, Inc. 相似文献
39.
Alan Washburn 《海军后勤学研究》1994,41(7):935-943
A pursuer (P) pursues an evader(E), with each party choosing a speed in ignorance of the other's choice. Going extremely fast is not wise for either party because doing so would quickly exhaust available energy. The situation is modeled as a two-person zero-sum game. The game may or may not have a saddle point, depending on the energy ratio and tactical parameters. © 1994 John Wiley & Sons, Inc. 相似文献
40.
Alan J. Kaplan 《海军后勤学研究》1993,40(7):1003-1011
This article defines a class of univariate functions termed composite unimodal, and shows how their minimization admits an effective search procedure, albeit one not as efficient as is Fibonacci search for unimodal functions. An approximate Lagrangian approach to an important real-world logistics problem is seen to yield a surrogate problem whose objective function is composite unimodal. The mathematical form of this objective function is likely to be encountered in solving future real-world problems. © 1993 John Wiley & Sons, Inc. 相似文献